Description
A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow occurs in the DhcpListClient handler of the httpd component on the Tenda F453 router. By manipulating the page argument to the /goform/DhcpListClient interface, an attacker can overflow a server‑side buffer during request parsing. This memory corruption can be used to execute arbitrary code with the privileges of the web server process, allowing full compromise of the device. The exploit is publicly disclosed and can be performed remotely through the router’s web interface, making it a serious threat to confidentiality, integrity, and availability.

Affected Systems

Tenda F453 routers running firmware version 1.0.0.3. No other models or firmware versions are currently known to be affected, but the vulnerability is identified by the specific CPE identifiers listed for this product.

Risk and Exploitability

The CVSS score 8.7 classifies this flaw as high severity. The EPSS value of <1% indicates a low predicted exploitation probability at present, yet the vulnerability is not listed in the CISA KEV catalog. The most likely attack vector is remote over the internet or local network, where an attacker can access the vulnerable /goform/DhcpListClient endpoint. Success requires only network access to the device’s web interface; no authentication is specifically required, making the attack relatively straightforward for motivated adversaries.

Generated by OpenCVE AI on April 16, 2026 at 15:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tenda F453 firmware to the latest available release that contains the fix for the DhcpListClient buffer overflow.
  • If a firmware update is not yet available, restrict or block external access to the /goform/DhcpListClient HTTP endpoint by applying firewall rules or disabling remote management features.
  • Continuously monitor device logs for anomalous DhcpListClient requests and implement intrusion detection or rate‑limiting to mitigate repeated exploitation attempts.

Generated by OpenCVE AI on April 16, 2026 at 15:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Fri, 27 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. This manipulation of the argument page causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Title Tenda F453 httpd DhcpListClient fromDhcpListClient buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T17:19:02.067Z

Reserved: 2026-02-26T15:16:28.586Z

Link: CVE-2026-3272

cve-icon Vulnrichment

Updated: 2026-02-27T17:18:49.525Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T00:16:59.360

Modified: 2026-02-27T15:48:08.343

Link: CVE-2026-3272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:00:13Z

Weaknesses