Description
A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromNatStaticSetting of the file /goform/NatStaticSetting of the component httpd. Executing a manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-25
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Restrict Access
AI Analysis

Impact

A buffer overflow flaw exists in the httpd component of Tenda F453 firmware 1.0.0.3, specifically in the fromNatStaticSetting function that processes the page argument in /goform/NatStaticSetting. Malicious manipulation of this argument can corrupt memory and potentially allow an attacker to execute arbitrary code on the device. The vulnerability does not require local access and can be triggered from any remote host that can reach the router’s web interface.

Affected Systems

The flaw affects Tenda routers marketed as the F453 model running firmware 1.0.0.3. No other hardware or firmware versions are listed as vulnerable in the available data.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, and the EPSS score of less than 1% suggests a low current exploitation probability, though the vulnerability has been disclosed publicly and an exploit is available. Because the issue is exploitable remotely and can lead to full compromise of the device, the risk remains significant. The vendor’s status is not included in CISA’s KEV catalog, but the lack of a patch in this firmware version creates a clear window for attackers to target affected systems.

Generated by OpenCVE AI on April 18, 2026 at 10:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict access to the router's web interface to trusted IP ranges only or disable remote management to block the /goform/NatStaticSetting endpoint.
  • Monitor HTTP logs for unusual requests targeting the NatStaticSetting API and investigate potential intrusion attempts.
  • Check the vendor's official website regularly for firmware updates that address this vulnerability, and apply any available update as soon as it is released.

Generated by OpenCVE AI on April 18, 2026 at 10:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f453
Tenda f453 Firmware
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453
Tenda f453 Firmware

Wed, 25 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromNatStaticSetting of the file /goform/NatStaticSetting of the component httpd. Executing a manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title Tenda F453 httpd NatStaticSetting fromNatStaticSetting buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:56:35.819Z

Reserved: 2026-02-24T21:58:52.123Z

Link: CVE-2026-3168

cve-icon Vulnrichment

Updated: 2026-02-25T16:56:15.481Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T07:16:02.927

Modified: 2026-02-25T17:52:49.283

Link: CVE-2026-3168

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses