Description
A vulnerability has been found in Tenda F453 up to 1.0.0.3. Impacted is the function TendaTelnet of the file /goform/telnet of the component Telnet Service. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection via Telnet Service
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in the Telnet Service of Tenda F453 routers running firmware version 1.0.0.3 or earlier. The flaw resides in the TendaTelnet function accessed through the /goform/telnet endpoint and allows an attacker to inject arbitrary operating‑system commands. This results in the execution of those commands on the device, giving attackers a foothold that can lead to full compromise or misuse of the router as a pivot point.

Affected Systems

The affected devices are Tenda F453 routers with firmware 1.0.0.3 or earlier. No other Tenda models or firmware releases are listed as vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% shows a low probability of exploitation in the wild. The vulnerability is not present in the CISA KEV catalog. The attack can be carried out remotely by sending a crafted request to the Telnet Service; successful exploitation would grant the attacker the ability to execute commands on the device. Given the remote nature of the attack vector, operators should treat this as a high‑risk flaw if the service is exposed to untrusted networks.

Generated by OpenCVE AI on April 28, 2026 at 05:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version that removes the vulnerability; verify that the latest release no longer contains the TendaTelnet function.
  • If a patch is not available, disable or block the Telnet service entirely and restrict access to the local network or trusted IP ranges.
  • Monitor network traffic and router logs for unusual Telnet activity, and apply intrusion detection rules to flag malformed requests.

Generated by OpenCVE AI on April 28, 2026 at 05:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*

Mon, 27 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda f453
Vendors & Products Tenda f453

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda F453 up to 1.0.0.3. Impacted is the function TendaTelnet of the file /goform/telnet of the component Telnet Service. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title Tenda F453 Telnet Service telnet TendaTelnet command injection
First Time appeared Tenda
Tenda f453 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f453 Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda F453 F453 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T17:31:16.306Z

Reserved: 2026-04-24T19:24:59.040Z

Link: CVE-2026-6989

cve-icon Vulnrichment

Updated: 2026-04-27T17:31:05.974Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-25T18:16:18.907

Modified: 2026-04-30T14:10:06.920

Link: CVE-2026-6989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:45:23Z

Weaknesses