Impact
A stack-based buffer overflow arises in the fromAddressNat function used by the Tenda F453 router's web interface (httpd /goform/addressNat). Manipulating the entrys argument can corrupt memory and enable an attacker to execute arbitrary code on the device. The vulnerability is exploitable over the network and publicly documented, meaning a remote attacker with internet access to the router could gain full control of the system, compromise confidentiality, integrity, and availability of the network protected by the device.
Affected Systems
The flaw is present only in the Tenda F453 router model running firmware version 1.0.0.3. No other firmware revisions or Tenda models are confirmed to be affected.
Risk and Exploitability
The CVSS base score of 8.7 classifies the vulnerability as high severity, but the EPSS score of less than 1 % indicates a low current probability of exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote, targeting the HTTP/HTTPS management interface; successful exploitation requires the ability to send crafted HTTP requests to the affected endpoint and no special privileges beyond network connectivity to the router.
OpenCVE Enrichment