Description
A vulnerability was found in Tenda F453 1.0.0.3. This impacts the function fromP2pListFilter of the file /goform/P2pListFilterof of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-02-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow leading to potential code execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow occurs in the fromP2pListFilter function within the httpd component, triggered by the page parameter of the /goform/P2pListFilterof interface. The flaw allows an attacker to overwrite stack or heap memory, which can result in arbitrary code execution, denial of service, and full compromise of the affected Tenda F453 router. The weakness aligns with improper boundary checks and buffer overrun vulnerabilities (CWE-119 and CWE-120).

Affected Systems

The vulnerability applies to the Tenda F453 router running firmware version 1.0.0.3. No other Tenda models or firmware versions are indicated as affected.

Risk and Exploitability

The scored CVSS is 8.7, indicating high severity. The EPSS is below 1%, suggesting low current exploitation probability, but the exploit exists publicly and can be launched remotely via crafted HTTP requests. The vulnerability is not listed in the CISA KEV catalog, so there is no mandatory government mitigation. An attacker with network access to the router’s management interface can send malicious requests and potentially take full control of the device.

Generated by OpenCVE AI on April 17, 2026 at 14:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest release that includes the buffer overflow fix.
  • Reboot the router after applying the firmware upgrade to ensure all services reload with the corrected code.
  • If a firmware upgrade is not immediately available, block external access to the /goform/P2pListFilterof endpoint using firewall rules or web filtering to prevent remote exploitation.
  • Monitor router logs for anomalous requests or errors that may indicate attempted exploitation.

Generated by OpenCVE AI on April 17, 2026 at 14:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Fri, 27 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda F453 1.0.0.3. This impacts the function fromP2pListFilter of the file /goform/P2pListFilterof of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Title Tenda F453 httpd P2pListFilterof fromP2pListFilter buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T17:25:44.383Z

Reserved: 2026-02-26T15:16:24.164Z

Link: CVE-2026-3271

cve-icon Vulnrichment

Updated: 2026-02-27T17:25:31.735Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T00:16:59.143

Modified: 2026-02-27T18:30:41.480

Link: CVE-2026-3271

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses