Description
A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Executing a manipulation of the argument entrys can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via buffer overflow in the httpd addressNat handler
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow arises in the fromAddressNat function used by the Tenda F453 router's web interface (httpd /goform/addressNat). Manipulating the entrys argument can corrupt memory and enable an attacker to execute arbitrary code on the device. The vulnerability is exploitable over the network and publicly documented, meaning a remote attacker with internet access to the router could gain full control of the system, compromise confidentiality, integrity, and availability of the network protected by the device.

Affected Systems

The flaw is present only in the Tenda F453 router model running firmware version 1.0.0.3. No other firmware revisions or Tenda models are confirmed to be affected.

Risk and Exploitability

The CVSS base score of 8.7 classifies the vulnerability as high severity, but the EPSS score of less than 1 % indicates a low current probability of exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote, targeting the HTTP/HTTPS management interface; successful exploitation requires the ability to send crafted HTTP requests to the affected endpoint and no special privileges beyond network connectivity to the router.

Generated by OpenCVE AI on April 17, 2026 at 14:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tenda F453 firmware to a version that patches the buffer overflow.
  • If no update is immediately available, restrict external access to the router’s web management ports (80/443) by configuring the firewall or router’s access controls so only local LAN hosts can reach them.
  • Continuously monitor router log files for unusual HTTP traffic or attempts to exploit the /goform/addressNat endpoint and enforce strong, unique administrative credentials.

Generated by OpenCVE AI on April 17, 2026 at 14:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Fri, 27 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Executing a manipulation of the argument entrys can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title Tenda F453 httpd addressNat fromAddressNat buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:55:21.322Z

Reserved: 2026-02-26T15:16:37.337Z

Link: CVE-2026-3275

cve-icon Vulnrichment

Updated: 2026-02-27T18:55:17.072Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T02:16:20.747

Modified: 2026-02-27T15:46:20.130

Link: CVE-2026-3275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses