Description
A flaw has been found in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. Affected is the function sub_427C3C of the file /goform/SafeMacFilter. This manipulation of the argument page causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2026-04-30
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A stack-based buffer overflow exists in the SafeMacFilter web interface of the Tenda 4G300 router. The flaw is triggered by an improperly validated argument to the /goform/SafeMacFilter endpoint, allowing an attacker to overflow a stack buffer and overwrite control data. This can give the attacker arbitrary code execution on the device, compromising confidentiality, integrity, and availability. The vulnerability is identified by CWE‑119 and CWE‑121.

Affected Systems

The vulnerability is present in the US_4G300V1.0Mt_V1.01.42_CN_TDC01 firmware of the Tenda 4G300 router. Users of this model should verify whether their device is running this firmware version or earlier versions; newer releases from Tenda may have addressed the issue.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the existence of a published exploit and the remote nature of the attack suggest a significant risk. The attack can be carried out remotely by manipulating the page argument sent to /goform/SafeMacFilter, with no local access required. Given the high CVSS score and the presence of a proven exploit, the likelihood of exploitation in the wild is considered high. Monitoring for suspicious activity and applying a patch or workaround should be prioritized.

Generated by OpenCVE AI on April 30, 2026 at 13:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain the latest firmware release from Tenda that includes the SafeMacFilter fix
  • If an immediate firmware update is not possible, disable the SafeMacFilter feature via the router’s administrative interface
  • Implement network segmentation to isolate the router and monitor for anomalous traffic to the /goform/SafeMacFilter endpoint

Generated by OpenCVE AI on April 30, 2026 at 13:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:4g300:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:4g300_firmware:1.01.42_cn_tdc01:*:*:*:*:*:*:*

Thu, 30 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda 4g300
Vendors & Products Tenda 4g300

Thu, 30 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. Affected is the function sub_427C3C of the file /goform/SafeMacFilter. This manipulation of the argument page causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title Tenda 4G300 SafeMacFilter sub_427C3C stack-based overflow
First Time appeared Tenda
Tenda 4g300 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:4g300_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda 4g300 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda 4g300 4g300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-30T02:30:13.346Z

Reserved: 2026-04-29T19:21:15.379Z

Link: CVE-2026-7470

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T03:16:01.740

Modified: 2026-04-30T20:41:24.100

Link: CVE-2026-7470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses