Cyber Posture

CVE-2026-7099

HighPublic PoC

Published: 27 April 2026

Published
27 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2026-7099 is a buffer overflow vulnerability affecting the Tenda F456 router on firmware version 1.0.0.5. The flaw exists in the formQuickIndex function of the /goform/QuickIndex file within the httpd component, where manipulation of the mit_linktype argument triggers the overflow. It is classified under CWE-119 and CWE-120, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

The vulnerability enables remote exploitation by attackers possessing low privileges, such as authenticated users, with low attack complexity and no requirement for user interaction. Successful exploitation can result in high confidentiality, integrity, and availability impacts, potentially leading to arbitrary code execution on the device.

VulDB advisories document the issue and note that a public exploit is available on GitHub, which may be used by attackers. Practitioners should consult the Tenda website and referenced VulDB pages for any vendor-provided patches or mitigation steps.

Details

CWE(s)
CWE-119CWE-120

Affected Products

tenda
f456 firmware
1.0.0.5

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Buffer overflow in router's httpd web interface enables remote code execution from low-privileged access, directly facilitating Exploit Public-Facing Application and Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References