Description
A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Published: 2026-03-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack‑based buffer overflow exists in the fromNatlimit function of the /goform/Natlimit endpoint on Tenda F453 routers. When an attacker manipulates the 'page' argument, the overflow corrupts the stack and can be leveraged to execute arbitrary code or seize full control of the device. The flaw is classified as CWE‑119 and CWE‑121.

Affected Systems

The vulnerability affects the Tenda F453 router running firmware version 1.0.0.3. It is specific to the Parameters Handler component on this model; no other firmware revisions are listed as impacted.

Risk and Exploitability

The CVSS score of 8.7 signals high severity, while the EPSS score of less than 1% indicates a low probability of widespread attacks, yet a publicly available exploit is known. The flaw is not listed in the CISA KEV catalog. The likely attack vector is remote, via the router’s web interface, where an attacker crafts a malicious HTTP request to /goform/Natlimit to trigger the overflow. Access to the router and exposure of its management interface are prerequisites for exploitation.

Generated by OpenCVE AI on April 3, 2026 at 00:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to a fixed version released by Tenda.
  • Disable remote administration or block the router’s management ports from external networks if no update is available.
  • Place the router behind a firewall and enforce strict network segmentation to prevent attackers from reaching the interface directly.
  • Monitor traffic for suspicious POST requests to /goform/Natlimit and consider blocking unauthorized attempts.

Generated by OpenCVE AI on April 3, 2026 at 00:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 23 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Sun, 22 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Title Tenda F453 Parameters Natlimit fromNatlimit stack-based overflow
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T13:47:08.402Z

Reserved: 2026-03-21T16:57:16.690Z

Link: CVE-2026-4553

cve-icon Vulnrichment

Updated: 2026-03-23T13:46:44.048Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T16:16:04.300

Modified: 2026-04-02T20:50:57.523

Link: CVE-2026-4553

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:13Z

Weaknesses