Tenda F456 Router Vulnerable to Remote Buffer Overflow (CVE-2026-7098)
The National Vulnerability Database has disclosed CVE-2026-7098, a critical buffer overflow vulnerability affecting Tenda F456 routers running firmware version 1.0.0.5. The flaw resides in the httpd component, specifically within the /goform/DhcpListClient functionality. Attackers can exploit this by manipulating arguments passed to the fromDhcpListClient function, leading to a remote code execution or denial-of-service condition.
This vulnerability carries a CVSS score of 8.8 (HIGH), indicating a significant risk. Its remote exploitability and low attack complexity, coupled with insufficient privileges required for exploitation (PR:L), make it an attractive target. The National Vulnerability Database notes that public exploit code is available, amplifying the immediate threat to organizations relying on these devices.
Defenders should prioritize patching or replacing affected Tenda F456 routers immediately. Network segmentation and intrusion detection systems can help mitigate potential exploitation attempts. Given the availability of exploit code, assume this vulnerability is actively being targeted and conduct thorough network audits for any signs of compromise related to this specific CVE.
What This Means For You
- If your organization utilizes Tenda F456 routers, you must verify firmware versions and patch to 1.0.0.5 or later immediately to address CVE-2026-7098. Given the public exploit availability, assume compromise is possible and audit network traffic for suspicious activity originating from or targeting these devices.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7098 Tenda F456 Router Remote Buffer Overflow via DhcpListClient
title: CVE-2026-7098 Tenda F456 Router Remote Buffer Overflow via DhcpListClient
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7098 by targeting the /goform/DhcpListClient endpoint with a POST request containing the 'page=' parameter, which is known to trigger a buffer overflow vulnerability in Tenda F456 routers.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7098/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/goform/DhcpListClient'
cs-method|exact:
- 'POST'
cs-uri-query|contains:
- 'page='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7098 | Buffer Overflow | Tenda F456 version 1.0.0.5 |
| CVE-2026-7098 | Buffer Overflow | Vulnerable function: fromDhcpListClient in /goform/DhcpListClient |
| CVE-2026-7098 | Buffer Overflow | Vulnerable component: httpd |
| CVE-2026-7098 | Buffer Overflow | Vulnerable argument: page |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 12:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.