CVE-2026-3376:
Buffer overflow vulnerability in Tenda F453 1.0.0.3 router's SafeMacFilter function allows remote attackers to execute arbitrary code.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.8High- Published Date:Feb 28, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.1
- EPSS Percentile:26%
Exploitability
- Score:2.8
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:LOW
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Buffer overflow vulnerability in Tenda F453 1.0.0.3 router's SafeMacFilter function allows remote attackers to execute arbitrary code.
Overview
The Tenda F453 router, version 1.0.0.3, contains a critical buffer overflow vulnerability in its SafeMacFilter functionality. This vulnerability allows remote attackers with low privileges to potentially execute arbitrary code or cause a denial of service. The vulnerability has been assigned a CVSS v3.1 base score of 8.8, indicating a high severity level. The attack vector is network-based, requires low attack complexity, and does not need user interaction. The potential impact includes complete compromise of confidentiality, integrity, and availability of the affected system.
Remediation
- As of the vulnerability's disclosure, no official patch or remediation has been announced by Tenda. Users of the affected Tenda F453 router should take the following precautions:
- 1. Monitor for and apply any security updates or patches released by Tenda.
- 2. Implement strong network segmentation to isolate vulnerable devices.
- 3. Restrict remote access to the router's management interface.
- 4. Use strong, unique passwords for all router accounts.
- 5. Disable unnecessary services and features on the router.
- 6. Consider replacing the affected router with a more secure alternative if no patch becomes available.
- It is crucial to regularly check for updates from Tenda and implement any security patches as soon as they become available.
References
- [1] GitHub - Litengzheng/vul_db: F453 vulnerability details. https://github.com/Litengzheng/vul_db/blob/main/F453/vul_76/README.md
- [2] VulDB - Vulnerability entry 348261. https://vuldb.com/?id.348261
- [3] VulDB - CTI entry 348261. https://vuldb.com/?ctiid.348261
- [4] VulDB - Submission 759623. https://vuldb.com/?submit.759623
- [5] Tenda - Official website. https://www.tenda.com.cn/
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.