Description
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the QuickIndex endpoint of Tenda F453, where manipulation of the arguments mit_linktype or PPPOEPassword causes memory corruption. The flaw is a classic buffer overflow (CWE-119) combined with stack-based overflow (CWE-121), providing attacker control over instruction flow and potentially full remote code execution. The exploit can compromise confidentiality, integrity, and availability of the device and any connected network resources.

Affected Systems

The vulnerability affects routers identified as Tenda F453, specifically firmware version 1.0.0.3. Users of this model should verify they are running this or earlier firmware to assess risk.

Risk and Exploitability

The CVSS base score of 8.7 denotes high severity, while the EPSS score of less than 1% indicates a low current exploitation probability. Nonetheless, the exploit code has been made public and can be launched remotely, meaning an adversary with network access to the router could trigger the overflow. The vulnerability is not listed in the CISA KEV catalog, but its impact remains significant due to the severity rating and remote launch capability.

Generated by OpenCVE AI on April 16, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware version released by Tenda, which contains a fix for the QuickIndex stack overflow.
  • If a firmware update is not yet available, block or disable access to the /goform/QuickIndex URL using a firewall or access control list.
  • Restrict remote management of the device to trusted local networks or a VPN, minimizing exposure to the vulnerable endpoint.

Generated by OpenCVE AI on April 16, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 08 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Title Tenda F453 QuickIndex sub_3C6C0 stack-based overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T15:36:29.701Z

Reserved: 2026-03-07T17:44:39.662Z

Link: CVE-2026-3727

cve-icon Vulnrichment

Updated: 2026-03-11T15:36:26.897Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T10:15:50.650

Modified: 2026-03-09T15:24:42.697

Link: CVE-2026-3727

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:30:13Z

Weaknesses