Description
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Published: 2026-03-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the fromSafeClientFilter function of the Parameters Handler on Tenda F453 routers. By manipulating the 'menufacturer/Go' argument sent to the /goform/SafeClientFilter endpoint, an attacker can overwrite adjacent stack memory. This defect could allow an attacker to crash the service or potentially execute arbitrary code, jeopardizing the router’s integrity and availability.

Affected Systems

The vulnerability affects Tenda F453 routers running firmware version 1.0.0.3. No other versions are listed as compromised in the supplied data. Thus only devices with this specific firmware are at risk.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity attack. The EPSS score of less than 1% suggests low overall exploitation probability, yet the flaw is publicly known and exploitable remotely, as the attack vector originates from a crafted HTTP request to a publicly exposed endpoint. The vulnerability is not listed in the CISA KEV catalog, but the remote nature of the attack and the presence of a public exploit reduce confidence in the defense posture. Administrators should treat it as a high-risk vulnerability requiring immediate attention.

Generated by OpenCVE AI on April 3, 2026 at 00:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Tenda’s official website or support portal for a firmware patch addressing the buffer overflow.
  • If an updated firmware version is available, upgrade the router immediately.
  • If no patch is available, restrict access to the device’s management interface to trusted local networks only, or disable the /goform/SafeClientFilter functionality if possible.

Generated by OpenCVE AI on April 3, 2026 at 00:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 22 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
Title Tenda F453 Parameters SafeClientFilter fromSafeClientFilter memory corruption
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T16:39:31.040Z

Reserved: 2026-03-21T16:57:09.110Z

Link: CVE-2026-4551

cve-icon Vulnrichment

Updated: 2026-03-23T16:37:16.032Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T15:17:09.697

Modified: 2026-04-02T20:50:34.973

Link: CVE-2026-4551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:15Z

Weaknesses