Description
A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The flaw is a stack‑based buffer overflow in the fromSetCfm function found in /goform/setcfm of Tenda F453 firmware. By carefully crafting the arguments funcname/funcpara1, an attacker can overflow the local buffer, potentially allowing arbitrary code execution on the router. The description explicitly states that remote exploitation is possible, indicating that an attacker only needs network access to trigger the overflow.

Affected Systems

The vulnerability affects the Tenda F453 router, specifically firmware versions 1.0.0.3 and 1.If. The affected component is the fromSetCfm function in the firmware’s /goform/setcfm endpoint.

Risk and Exploitability

With a CVSS score of 8.7, this is a high‑severity vulnerability. The EPSS score is reported as less than 1%, suggesting a low likelihood of exploitation in the wild, but the publicly disclosed exploit means it could be used nonetheless. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to access the device over the network, sending the crafted input to trigger the buffer overflow and achieve remote code execution.

Generated by OpenCVE AI on April 16, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware version that removes the vulnerability, as provided by Tenda.
  • If no patch is available, restrict access to the web interface by blocking WAN connections or configuring the router’s firewall to deny traffic to the /goform/setcfm endpoint.
  • Disable or remove the affected functionality if possible through the router’s configuration interface, or replace the router with a non‑vulnerable model.

Generated by OpenCVE AI on April 16, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 08 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Title Tenda F453 setcfm fromSetCfm stack-based overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T15:36:06.431Z

Reserved: 2026-03-07T17:44:42.198Z

Link: CVE-2026-3728

cve-icon Vulnrichment

Updated: 2026-03-11T15:36:02.876Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T10:15:51.000

Modified: 2026-03-09T15:24:28.950

Link: CVE-2026-3728

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:30:13Z

Weaknesses