Impact
The flaw is a classic buffer overflow in the fromSetIpBind function of the Tenda F453 firmware, triggered by an oversized “page” argument to /goform/SetIpBind. An attacker who controls the input can overwrite critical stack data, eventually allowing arbitrary code execution or other destructive behavior. Because the vulnerable function is exposed via the router’s web interface, an external attacker can trigger the exploit remotely with no authentication required, exposing the device to full compromise.
Affected Systems
Tenda F453 routers running firmware 1.0.0.3, which includes the vulnerable fromSetIpBind implementation. The flaw is present in the specific firmware 1.0.0.3 build; versions before this build may not be affected, but no other versions have been confirmed.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity impact. EPSS less than 1% signals a low but non‑zero probability of exploitation in the wild. The vulnerability has not yet been listed in the KEV catalog, but the public disclosure and remote trigger point mean that threat actors could develop and deploy exploits at any time. The simple nature of the overflow and the lack of authentication requirements make it relatively easy for attackers to mount attacks against exposed routers.
OpenCVE Enrichment