Description
A vulnerability was determined in Tenda F453 1.0.0.3. Impacted is the function fromSetWifiGusetBasic of the file /goform/AdvSetWrlsafeset of the component httpd. This manipulation of the argument mit_ssid causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-25
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the httpd component of Tenda F453 firmware 1.0.0.3, specifically in the fromSetWifiGusetBasic function accessed via /goform/AdvSetWrlsafeset. Altering the mit_ssid argument can overflow the buffer, potentially allowing an attacker to inject and execute arbitrary code on the device, compromising confidentiality, integrity, and availability. The CVSS score of 8.7 indicates a high severity.

Affected Systems

The vulnerability affects Tenda F453 devices running firmware version 1.0.0.3. No other versions or models are listed as impacted.

Risk and Exploitability

The attack vector is remote, with the exploit triggered through the device’s web interface. Public disclosure and available exploit code increase the risk, though the EPSS score of less than 1% suggests low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The combination of a high CVSS score and remote trigger means an adversary could potentially compromise affected devices if they exploit the flaw before a patch is applied.

Generated by OpenCVE AI on April 17, 2026 at 15:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware update that resolves the buffer overflow in the AdvSetWrlsafeset endpoint.
  • If an update is unavailable, block or restrict external HTTP access to the device’s web interface, limiting exposure to the vulnerable endpoint.
  • Configure network or firewall rules to prevent unsolicited traffic to the device’s management interface, and monitor logs for attempts to access /goform/AdvSetWrlsafeset.

Generated by OpenCVE AI on April 17, 2026 at 15:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453 Firmware
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
Vendors & Products Tenda f453 Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f453
Vendors & Products Tenda
Tenda f453

Wed, 25 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda F453 1.0.0.3. Impacted is the function fromSetWifiGusetBasic of the file /goform/AdvSetWrlsafeset of the component httpd. This manipulation of the argument mit_ssid causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda F453 httpd AdvSetWrlsafeset fromSetWifiGusetBasic buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T21:06:06.743Z

Reserved: 2026-02-24T21:58:38.835Z

Link: CVE-2026-3165

cve-icon Vulnrichment

Updated: 2026-02-25T21:05:59.461Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T06:16:27.387

Modified: 2026-02-25T17:53:14.887

Link: CVE-2026-3165

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:30:06Z

Weaknesses