Description
A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow flaw has been found in the fromVirtualSer function of the VirtualSer component within the Tenda F453 firmware 1.0.0.3. The vulnerability is rooted in improper handling of user‑supplied input, which violates both the buffer overflow (CWE‑119) and stack-based buffer overflow (CWE‑121) criteria, allowing an attacker to corrupt the stack and potentially execute arbitrary code with the privileges of the vulnerable process.

Affected Systems

Devices affected are Tenda F453 routers running firmware version 1.0.0.3. The flaw resides in the Parameters Handler component exposed via the web administration interface, and any router that has not yet received an updated firmware will remain vulnerable.

Risk and Exploitability

The vulnerability carries a high CVSS score of 8.7, and current exploit probability is reported as less than 1%. It is not listed in the CISA Known Exploited Vulnerabilities catalog, but the exploit is publicly disclosed and can be triggered remotely by sending a specially crafted request to the VirtualSer endpoint. Successful exploitation would compromise the device’s confidentiality, integrity, and availability.

Generated by OpenCVE AI on April 3, 2026 at 00:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda support website and download the latest firmware revision that addresses the buffer overflow.
  • Follow Tenda’s firmware update instructions to install the new version.
  • Reboot the device and confirm the firmware version matches the patched release.
  • If a firmware update is not yet available, disable or restrict remote access to the router’s web management interface.
  • Continuously monitor the device’s logs for any abnormal activity related to the VirtualSer endpoint.

Generated by OpenCVE AI on April 3, 2026 at 00:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 22 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title Tenda F453 Parameters VirtualSer fromVirtualSer memory corruption
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T16:03:15.498Z

Reserved: 2026-03-21T16:57:13.437Z

Link: CVE-2026-4552

cve-icon Vulnrichment

Updated: 2026-03-23T16:03:11.300Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T15:17:09.917

Modified: 2026-04-02T20:50:44.887

Link: CVE-2026-4552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:14Z

Weaknesses