No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda f456 |
|
| Vendors & Products |
Tenda
Tenda f456 |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 26 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. | |
| Title | Tenda F456 httpd PPTPDClient fromPptpUserAdd buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T13:30:53.033Z
Reserved: 2026-04-26T01:02:42.651Z
Link: CVE-2026-7054
Updated: 2026-04-27T13:11:01.289Z
Status : Awaiting Analysis
Published: 2026-04-26T22:17:32.580
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-7054
No data.
OpenCVE Enrichment
Updated: 2026-04-27T18:41:59Z