CVE-2026-3379:
Buffer overflow vulnerability in Tenda F453 1.0.0.3 router allows remote attackers to execute arbitrary code.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.8High- Published Date:Mar 1, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.1
- EPSS Percentile:23%
Exploitability
- Score:2.8
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:LOW
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Buffer overflow vulnerability in Tenda F453 1.0.0.3 router allows remote attackers to execute arbitrary code.
Overview
The Tenda F453 router vulnerability is classified as high severity with a CVSS v3.1 base score of 8.8. It allows remote attackers with low privileges to potentially execute arbitrary code or cause denial of service. The vulnerability stems from improper input validation in the IP binding functionality. Successful exploitation could lead to complete compromise of the affected device, potentially impacting the confidentiality, integrity, and availability of the router and connected network.
Remediation
- As of the vulnerability disclosure, no official patch has been released by Tenda. Users of the affected Tenda F453 router should take the following precautions:
- 1. Monitor for and apply any firmware updates released by Tenda addressing this vulnerability.
- 2. Implement strong network segmentation to isolate affected devices.
- 3. Restrict remote access to the router's management interface.
- 4. Use strong, unique passwords for all router accounts.
- 5. Disable unnecessary services and features on the router.
- 6. Consider replacing the affected router with a security-supported alternative if no patch becomes available.
References
- [1] GitHub - Litengzheng/vul_db: F453 vulnerability details, https://github.com/Litengzheng/vul_db/blob/main/F453/vul_79/README.md
- [2] VulDB - Tenda F453 up to 1.0.0.3 fromSetIpBind page Buffer Overflow, https://vuldb.com/?id.348264
- [3] Tenda Official Website, https://www.tenda.com.cn/
- [4] VulDB CTI Report, https://vuldb.com/?ctiid.348264
- [5] VulDB Submission Page, https://vuldb.com/?submit.759626
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.