CVE-2026-3165: Buffer Overflow in Tenda F453
A vulnerability was determined in Tenda F453 1.0.0.3. Impacted is the function fromSetWifiGusetBasic of the file /goform/AdvSetWrlsafeset of the component httpd. This manipulation of the argument mit_ssid causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2026-3165 identifies a critical buffer overflow vulnerability in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the function fromSetWifiGusetBasic within the httpd service, specifically in the handling of the mit_ssid argument submitted to the /goform/AdvSetWrlsafeset endpoint. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow due to improper input validation or bounds checking. This overflow can corrupt memory, potentially allowing arbitrary code execution with the privileges of the httpd process. The attack vector requires no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability has been publicly disclosed, though no confirmed exploits in the wild have been reported yet. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. The affected product, Tenda F453, is a consumer-grade wireless router commonly used in residential and small office environments. The lack of available patches or official firmware updates at the time of disclosure increases the urgency for mitigations. This vulnerability could be leveraged to gain persistent control over the device, intercept or manipulate network traffic, or launch further attacks within the local network.
Potential Impact
The impact of CVE-2026-3165 is significant for organizations and individuals using the Tenda F453 router version 1.0.0.3. Exploitation can lead to remote code execution, allowing attackers to fully compromise the device. This could result in unauthorized access to internal networks, interception of sensitive data, disruption of network services, and use of the device as a foothold for lateral movement or botnet recruitment. The compromise of a network gateway device undermines the confidentiality, integrity, and availability of all connected systems. Small businesses and home users with limited security monitoring are particularly vulnerable. The public disclosure increases the likelihood of exploit development and automated scanning, raising the risk of widespread attacks. Without timely patching or mitigation, affected networks remain exposed to persistent threats and potential data breaches.
Mitigation Recommendations
1. Immediately isolate affected Tenda F453 devices from untrusted networks to prevent remote exploitation. 2. Monitor vendor communications for official firmware updates addressing CVE-2026-3165 and apply patches as soon as they become available. 3. If no patch is available, restrict access to the router’s management interface and the /goform/AdvSetWrlsafeset endpoint via firewall rules or network segmentation. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious HTTP requests targeting the vulnerable endpoint. 5. Change default credentials and disable remote management features if not required. 6. Conduct regular network scans to identify devices running vulnerable firmware versions. 7. Educate users about the risks of using outdated router firmware and encourage timely updates. 8. Consider replacing affected devices with models that have active security support if patches are not forthcoming.
Affected Countries
China, India, Indonesia, Vietnam, Thailand, Brazil, Russia, South Africa, Mexico, Egypt
CVE-2026-3165: Buffer Overflow in Tenda F453
Description
A vulnerability was determined in Tenda F453 1.0.0.3. Impacted is the function fromSetWifiGusetBasic of the file /goform/AdvSetWrlsafeset of the component httpd. This manipulation of the argument mit_ssid causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3165 identifies a critical buffer overflow vulnerability in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the function fromSetWifiGusetBasic within the httpd service, specifically in the handling of the mit_ssid argument submitted to the /goform/AdvSetWrlsafeset endpoint. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow due to improper input validation or bounds checking. This overflow can corrupt memory, potentially allowing arbitrary code execution with the privileges of the httpd process. The attack vector requires no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability has been publicly disclosed, though no confirmed exploits in the wild have been reported yet. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. The affected product, Tenda F453, is a consumer-grade wireless router commonly used in residential and small office environments. The lack of available patches or official firmware updates at the time of disclosure increases the urgency for mitigations. This vulnerability could be leveraged to gain persistent control over the device, intercept or manipulate network traffic, or launch further attacks within the local network.
Potential Impact
The impact of CVE-2026-3165 is significant for organizations and individuals using the Tenda F453 router version 1.0.0.3. Exploitation can lead to remote code execution, allowing attackers to fully compromise the device. This could result in unauthorized access to internal networks, interception of sensitive data, disruption of network services, and use of the device as a foothold for lateral movement or botnet recruitment. The compromise of a network gateway device undermines the confidentiality, integrity, and availability of all connected systems. Small businesses and home users with limited security monitoring are particularly vulnerable. The public disclosure increases the likelihood of exploit development and automated scanning, raising the risk of widespread attacks. Without timely patching or mitigation, affected networks remain exposed to persistent threats and potential data breaches.
Mitigation Recommendations
1. Immediately isolate affected Tenda F453 devices from untrusted networks to prevent remote exploitation. 2. Monitor vendor communications for official firmware updates addressing CVE-2026-3165 and apply patches as soon as they become available. 3. If no patch is available, restrict access to the router’s management interface and the /goform/AdvSetWrlsafeset endpoint via firewall rules or network segmentation. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious HTTP requests targeting the vulnerable endpoint. 5. Change default credentials and disable remote management features if not required. 6. Conduct regular network scans to identify devices running vulnerable firmware versions. 7. Educate users about the risks of using outdated router firmware and encourage timely updates. 8. Consider replacing affected devices with models that have active security support if patches are not forthcoming.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-24T21:58:38.835Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f6d86b7ef31ef0b587d3d
Added to database: 2/25/2026, 9:45:42 PM
Last enriched: 2/26/2026, 9:58:27 PM
Last updated: 4/12/2026, 10:01:49 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.