Description
A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-03-01
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the frmL7ImForm function of the Tenda F453 router firmware 1.0.0.3. By manipulating the page argument supplied to the /goform/L7Im endpoint, an attacker can cause a memory overrun that may allow arbitrary code execution or denial of service on the device. The vulnerability carries a CVSS score of 8.7, indicating high severity, and the description explicitly states it can be exploited remotely.

Affected Systems

The vulnerability affects the Tenda F453 router running firmware version 1.0.0.3. No other firmware versions or Tenda products are identified as impacted in the provided data.

Risk and Exploitability

The low EPSS score of less than 1% suggests that current exploit activity is rare, and the issue is not listed in the CISA KEV catalog. Nevertheless, the flaw is publicly documented and an exploit exists, allowing attackers with remote access to the router’s management interface to construct a malicious request to /goform/L7Im and trigger the overflow. Compromise could grant the attacker control of the device or disrupt network services. No special privileges or local access are required, making the threat straightforward for attackers with external network visibility.

Generated by OpenCVE AI on April 16, 2026 at 15:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version that addresses the buffer overflow.
  • Restrict remote access to the router’s management interfaces by firewalling or IP whitelisting so only trusted networks can reach /goform/L7Im.
  • Monitor network traffic for anomalous requests targeting the /goform/L7Im endpoint and alert on repeated or malformed page parameters.

Generated by OpenCVE AI on April 16, 2026 at 15:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 01 Mar 2026 03:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Title Tenda F453 L7Im frmL7ImForm buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-06T14:53:24.355Z

Reserved: 2026-02-28T06:56:58.789Z

Link: CVE-2026-3380

cve-icon Vulnrichment

Updated: 2026-03-06T14:53:15.687Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T04:16:01.890

Modified: 2026-03-03T17:32:47.773

Link: CVE-2026-3380

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:15:39Z

Weaknesses