Description
A security flaw has been discovered in Tenda F453 1.0.0.3. Affected by this issue is the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow in the frmL7ProtForm function of the Tenda F453 HTTP server can be triggered by carefully crafted ‘page’ parameters sent to /goform/L7Prot. The overflow allows an attacker to overwrite the stack and execute arbitrary code, potentially giving full control over the device. The flaw can be exploited remotely over HTTP, which means an attacker anywhere on the internet could reach the vulnerable endpoint if the router is exposed.

Affected Systems

The vulnerability affects the Tenda F453 router running firmware version 1.0.0.3. No other firmware versions or Tenda device models are reported to be impacted based on the current CNA data.

Risk and Exploitability

The vulnerability has a CVSS score of 8.7, indicating high severity. The EPSS score is less than 1 %, suggesting a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The flaw can be abused by sending a specially crafted HTTP request to the /goform/L7Prot path, which is reachable from the external network if the router’s web interface is not restricted. As the attack requires only remote access to the device’s management interface, it is feasible for adversaries without local network access. No additional preconditions or privileges are required beyond external accessibility.

Generated by OpenCVE AI on April 16, 2026 at 15:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda F453 firmware that addresses the buffer overflow
  • If no update is available, configure the router’s firewall to block external access to the /goform/L7Prot endpoint or the entire administrator interface
  • Restrict management access to the local network only and enforce strong authentication practices

Generated by OpenCVE AI on April 16, 2026 at 15:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Fri, 27 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Tenda F453 1.0.0.3. Affected by this issue is the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Title Tenda F453 httpd L7Prot frmL7ProtForm buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T14:26:05.411Z

Reserved: 2026-02-26T15:16:34.468Z

Link: CVE-2026-3274

cve-icon Vulnrichment

Updated: 2026-03-02T14:26:00.477Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T02:16:20.533

Modified: 2026-02-27T15:46:57.927

Link: CVE-2026-3274

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:45:16Z

Weaknesses