Description
A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-01
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is a classic buffer overflow in the fromSetIpBind function of the Tenda F453 firmware, triggered by an oversized “page” argument to /goform/SetIpBind. An attacker who controls the input can overwrite critical stack data, eventually allowing arbitrary code execution or other destructive behavior. Because the vulnerable function is exposed via the router’s web interface, an external attacker can trigger the exploit remotely with no authentication required, exposing the device to full compromise.

Affected Systems

Tenda F453 routers running firmware 1.0.0.3, which includes the vulnerable fromSetIpBind implementation. The flaw is present in the specific firmware 1.0.0.3 build; versions before this build may not be affected, but no other versions have been confirmed.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity impact. EPSS less than 1% signals a low but non‑zero probability of exploitation in the wild. The vulnerability has not yet been listed in the KEV catalog, but the public disclosure and remote trigger point mean that threat actors could develop and deploy exploits at any time. The simple nature of the overflow and the lack of authentication requirements make it relatively easy for attackers to mount attacks against exposed routers.

Generated by OpenCVE AI on April 16, 2026 at 15:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the F453 firmware to the latest version that patches the fromSetIpBind buffer overflow, if available from Tenda.
  • Restrict access to the router’s web interface by placing it behind a VLAN or firewall, limiting it to trusted internal networks only.
  • If an update is not immediately possible, block or disable the /goform/SetIpBind endpoint via firewall or router ACLs to prevent remote exploitation.

Generated by OpenCVE AI on April 16, 2026 at 15:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 01 Mar 2026 02:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Tenda F453 SetIpBind fromSetIpBind buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-06T14:55:12.865Z

Reserved: 2026-02-28T06:55:39.646Z

Link: CVE-2026-3379

cve-icon Vulnrichment

Updated: 2026-03-06T14:55:07.643Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T03:16:16.743

Modified: 2026-03-03T17:33:26.577

Link: CVE-2026-3379

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:15:39Z

Weaknesses