Description
A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
Published: 2026-03-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via stack overflow
Action: Patch Immediately
AI Analysis

Impact

A stack-based buffer overflow exists in the WrlclientSet function of Tenda F453 firmware 1.0.0.3. The vulnerability is triggered by manipulating the GO argument in the /goform/WrlclientSet endpoint, allowing an attacker to overflow the stack and potentially execute arbitrary code. The exploit is reported to be usable remotely and is publicly available. The attacker could compromise the device, gaining control and potentially using it in a botnet or for further attacks. The impact covers confidentiality, integrity, and availability of the firmware and network the device protects.

Affected Systems

The affected system is the Tenda F453 router using firmware version 1.0.0.3. No other firmware revisions or models are listed as impacted. Vendors or users deploying the F453 with this firmware should treat the device as vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, though the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote via HTTP/TCP, where an attacker crafts requests to the /goform/WrlclientSet endpoint and supplies a malicious GO parameter. Successful exploitation would require network access to the router’s web interface and correct authentication or insufficient authentication checks.

Generated by OpenCVE AI on April 16, 2026 at 10:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tenda F453 firmware to a later version that includes the fix for the WrlclientSet buffer overflow.
  • If a firmware update is not available, block external access to the /goform/WrlclientSet endpoint using a firewall or router ACL, allowing access only from trusted local networks.
  • Continuously monitor device logs for abnormal requests to /goform/WrlclientSet and isolate the device from the network if suspicious activity is detected.

Generated by OpenCVE AI on April 16, 2026 at 10:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 08 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
Title Tenda F453 WrlclientSet stack-based overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:39:05.135Z

Reserved: 2026-03-07T20:54:57.245Z

Link: CVE-2026-3769

cve-icon Vulnrichment

Updated: 2026-03-10T20:39:01.441Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T21:15:51.470

Modified: 2026-03-09T15:25:24.423

Link: CVE-2026-3769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses