Description
A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via stack-based buffer overflow
Action: Patch immediately
AI Analysis

Impact

A stack-based buffer overflow (CWE-119, CWE-121) exists in the fromwebExcptypemanFilter function of the Tenda F453 firmware. Manipulating the 'page' argument in the /goform/webExcptypemanFilter API can corrupt the stack and enable an attacker to execute arbitrary code. This flaw can compromise confidentiality, integrity, and availability of the device and any network services it supports.

Affected Systems

The vulnerability affects Tenda F453 routers running firmware version 1.0.0.3. No other product variants are listed as affected.

Risk and Exploitability

The flaw carries a CVSS score of 8.7, indicating high severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild today. It is not yet listed in CISA’s KEV catalog. According to the description, the attack vector is remote, meaning an external attacker can trigger the overflow over the network.

Generated by OpenCVE AI on April 17, 2026 at 12:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda firmware that fixes the webExcptypemanFilter overflow.
  • If an immediate update is not possible, block external access to the /goform/webExcptypemanFilter endpoint or restrict the administration interface to the local network only.
  • Deploy network monitoring to detect abnormal traffic patterns or repeated requests to the vulnerable API and investigate any anomalies.

Generated by OpenCVE AI on April 17, 2026 at 12:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 08 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Tenda F453 webExcptypemanFilter fromwebExcptypemanFilter stack-based overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T15:33:11.866Z

Reserved: 2026-03-07T17:44:36.905Z

Link: CVE-2026-3726

cve-icon Vulnrichment

Updated: 2026-03-11T15:33:08.853Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T09:16:18.687

Modified: 2026-03-09T15:24:58.370

Link: CVE-2026-3726

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses