Description
A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-03-01
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow potentially leading to Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow in the httpd component of the Tenda F453 router. The function “fromGstDhcpSetSer” in the web form endpoint “/goform/GstDhcpSetSer” does not adequately validate the “dips” argument, allowing an attacker to overflow the buffer and overwrite return addresses. This flaw is categorized as CWE‑119 and CWE‑120, indicating unsafe memory handling and lack of bounds checking. If successfully exploited, the overflow could enable an attacker to execute arbitrary code on the device, compromising its confidentiality, integrity, and availability.

Affected Systems

Affected devices are Tenda F453 routers running firmware version 1.0.0.3, with the vulnerability present in the httpd component accessed via the web-based configuration interface.

Risk and Exploitability

The CVSS v3 score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests a very low probability that exploitation is being observed in the wild at present. The vulnerability is not listed in the CISA KEV catalog, but it remains publicly available and could be exploited remotely through the router’s HTTP management interface. Based on the description, it is inferred that an attacker would need network connectivity to the device and the ability to manipulate the “dips” parameter via the exposed web form. Given the high severity score and the fact that the attack can be initiated remotely, the risk to organizations that expose these devices to the internet is significant.

Generated by OpenCVE AI on April 18, 2026 at 10:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest firmware revision that contains the patch for the “fromGstDhcpSetSer” buffer overflow. If a firmware update is not yet available, contact the vendor for guidance on applying a security fix or a temporary patch.
  • If an immediate firmware update cannot be performed, restrict external access to the router’s HTTP management interface by placing the device behind a firewall, disabling remote management, or restricting management ports to trusted IP ranges.
  • If the router supports it, temporarily disable the GstDhcpSetSer configuration feature until a fix is applied to prevent the buffer overflow from being triggered while the device remains in use.

Generated by OpenCVE AI on April 18, 2026 at 10:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 02 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 01 Mar 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title Tenda F453 httpd GstDhcpSetSer fromGstDhcpSetSer buffer overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T16:00:38.866Z

Reserved: 2026-03-01T06:34:46.523Z

Link: CVE-2026-3399

cve-icon Vulnrichment

Updated: 2026-03-02T16:00:33.981Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T23:16:02.060

Modified: 2026-03-03T17:31:32.110

Link: CVE-2026-3399

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:15:25Z

Weaknesses