Description
A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component httpd. Such manipulation of the argument mit_ssid_index leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
Published: 2026-02-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the formWrlsafeset function of the Tenda F453 router’s web administration interface. By manipulating the mit_ssid_index argument sent to /goform/AdvSetWrlsafeset, an attacker can overflow a memory buffer, potentially allowing arbitrary code execution on the device. The flaw falls under non‑local buffer overflow weaknesses such as CWE‑119 and CWE‑120, and it can be triggered entirely over the network without requiring local access.

Affected Systems

The vulnerability impacts Tenda routers manufactured as the F453 model, specifically firmware version 1.0.0.3. Devices with earlier firmware may be unaffected, but no versions below 1.0.0.3 are confirmed to be safe. Any system running this firmware and exposed to the Internet is therefore at risk.

Risk and Exploitability

The CVSS score of 8.7 classifies this issue as high severity. An EPSS value of less than 1 % indicates that, while exploitation is technically possible, it is not widely automated. The flaw is not yet listed in the CISA KEV catalog. Because it can be triggered remotely via the web interface, the attack surface is broad and the potential impact is full remote code execution. Publicly available proof‑of‑concept exploits confirm that a remote attacker can gain control of the device, underscoring the urgency of a fix.

Generated by OpenCVE AI on April 16, 2026 at 15:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest available firmware that addresses the buffer overflow in the formWrlsafeset endpoint.
  • If a newer firmware version is not available, disable remote web management or block the /goform/AdvSetWrlsafeset URL with a firewall rule to prevent external access to the vulnerable function.
  • Restrict access to the router’s administrative interface to trusted local users only and enforce strong authentication to reduce the window of opportunity for an attacker.

Generated by OpenCVE AI on April 16, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Fri, 27 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component httpd. Such manipulation of the argument mit_ssid_index leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.
Title Tenda F453 httpd AdvSetWrlsafeset formWrlsafeset buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T19:00:02.747Z

Reserved: 2026-02-26T15:16:31.377Z

Link: CVE-2026-3273

cve-icon Vulnrichment

Updated: 2026-03-02T18:59:56.839Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T01:16:21.143

Modified: 2026-02-27T15:47:32.120

Link: CVE-2026-3273

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:00:13Z

Weaknesses