Description
A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Published: 2026-02-28
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a buffer overflow in the fromSafeUrlFilter function of the Tenda F453 router. Manipulating the page argument in the /goform/SafeUrlFilter interface causes the device to write beyond allocated memory, which can be leveraged to execute arbitrary code on the router. The failure to enforce bounds checking represents a classic buffer overflow flaw, allowing attackers to potentially take full control of the device.

Affected Systems

The flaw affects Tenda’s F453 model running firmware version 1.0.0.3. No other models or firmware revisions are listed as vulnerable in the available data.

Risk and Exploitability

This issue carries a CVSS score of 8.7, indicating high severity, while the EPSS score is below 1 % reflecting a low current probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, but it has been publicly disclosed and can be triggered remotely by sending a crafted request to the web interface. An attacker who succeeds may gain remote code execution on the router, compromising network security.

Generated by OpenCVE AI on April 16, 2026 at 15:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by Tenda that addresses the SafeUrlFilter buffer overflow.
  • If a firmware update is unavailable, disable or block access to the /goform/SafeUrlFilter endpoint on the router’s web interface using firewall or access control rules.
  • Apply network segmentation or place the router behind a firewall that restricts remote management traffic to trusted IP addresses.
  • Change the default admin credentials and enable two‑factor authentication where possible for the router’s management interface.

Generated by OpenCVE AI on April 16, 2026 at 15:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sat, 28 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Title Tenda F453 SafeUrlFilter fromSafeUrlFilter buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-06T15:01:00.743Z

Reserved: 2026-02-28T06:55:33.988Z

Link: CVE-2026-3377

cve-icon Vulnrichment

Updated: 2026-03-06T15:00:55.511Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T00:16:17.487

Modified: 2026-03-03T17:34:45.423

Link: CVE-2026-3377

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:15:39Z

Weaknesses