Description
A security flaw has been discovered in Tenda F453 1.0.0.3. The impacted element is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component httpd. Performing a manipulation of the argument webSiteId results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-25
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the Tenda F453 router’s httpd component, specifically the formWebTypeLibrary function that processes the webSiteId argument. When an attacker sends a crafted value for this parameter, the uncontrolled overwrite can lead to arbitrary code execution on the device. The description indicates that the flaw can be triggered remotely, and a public exploit has already been released, highlighting the vulnerability’s potential for high‑impact attacks.

Affected Systems

The vulnerable product is the Tenda F453 wireless router running firmware version 1.0.0.3. No other vendors or product lines are listed as affected.

Risk and Exploitability

The vulnerability has a CVSS score of 8.7, classifying it as high severity, and an EPSS score of less than 1 %. While the current exploitation probability is low, the public availability of an exploit and the remote nature of the attack vector raise the overall risk. The flaw is not present in the CISA KEV catalog, but admins should treat it with urgency because the exposure could compromise the device and any networks connected through it.

Generated by OpenCVE AI on April 17, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Tenda that addresses the httpd buffer overflow issue.
  • If an update is not yet available, block or restrict external access to the /goform/webtypelibrary HTTP endpoint using the router’s firewall or access‑control settings to prevent remote exploitation.
  • Limit remote management of the router to trusted internal networks only, disable any unused remote services, and monitor logs for any attempts to reach the vulnerable endpoint.

Generated by OpenCVE AI on April 17, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f453
Tenda f453 Firmware
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453
Tenda f453 Firmware

Wed, 25 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda F453 1.0.0.3. The impacted element is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component httpd. Performing a manipulation of the argument webSiteId results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda F453 httpd webtypelibrary formWebTypeLibrary buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T21:10:24.702Z

Reserved: 2026-02-24T21:58:49.388Z

Link: CVE-2026-3167

cve-icon Vulnrichment

Updated: 2026-02-25T21:10:13.680Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T07:16:02.690

Modified: 2026-02-25T17:52:59.187

Link: CVE-2026-3167

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:30:06Z

Weaknesses