Description
A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. Executing a manipulation of the argument wanmode/PPPOEPassword can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-01
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A buffer overflow exists in the function fromAdvSetWan, which processes the wanmode/PPPOEPassword argument in the /goform/AdvSetWan endpoint of Tenda F453 httpd. An attacker can supply crafted input that overflows a local buffer and potentially injects code or corrupts execution flow, resulting in remote code execution. The flaw belongs to the characters classes of CWE‑119 and CWE‑120. According to the advisory, the exploit is publicly available and can be launched without the need for special privileges. The stated impact is loss of confidentiality, integrity, and availability of the affected device.

Affected Systems

The affected device is the Tenda F453 wireless router running firmware version 1.0.0.3. No other products or firmware revisions are reported as vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, while an EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is remote over an HTTP request to /goform/AdvSetWan, and no authentication requirements are mentioned, implying that any host capable of reaching the HTTP service can attempt exploitation.

Generated by OpenCVE AI on April 16, 2026 at 14:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to the latest release that contains a fix for the buffer overflow in AdvSetWan.
  • If a firmware update is not available, configure the device’s firewall or network ACLs to block external access to the /goform/AdvSetWan endpoint, limiting configuration changes to the local management network.
  • Disable remote HTTP management or reduce the scope of remote configuration tools until a secure firmware revision is installed.

Generated by OpenCVE AI on April 16, 2026 at 14:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 02 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 01 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. Executing a manipulation of the argument wanmode/PPPOEPassword can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda F453 httpd AdvSetWan fromAdvSetWan buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T17:42:24.382Z

Reserved: 2026-03-01T06:34:42.518Z

Link: CVE-2026-3398

cve-icon Vulnrichment

Updated: 2026-03-02T17:40:22.390Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T22:16:17.270

Modified: 2026-03-03T17:32:11.063

Link: CVE-2026-3398

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:00:14Z

Weaknesses