Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3165: Buffer Overflow in Tenda F453

0
High
VulnerabilityCVE-2026-3165cvecve-2026-3165
Published: Wed Feb 25 2026 (02/25/2026, 06:02:12 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: F453

Description

A vulnerability was determined in Tenda F453 1.0.0.3. Impacted is the function fromSetWifiGusetBasic of the file /goform/AdvSetWrlsafeset of the component httpd. This manipulation of the argument mit_ssid causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:58:27 UTC

Technical Analysis

CVE-2026-3165 identifies a critical buffer overflow vulnerability in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the function fromSetWifiGusetBasic within the httpd service, specifically in the handling of the mit_ssid argument submitted to the /goform/AdvSetWrlsafeset endpoint. An attacker can remotely send a specially crafted request to this endpoint, causing a buffer overflow due to improper input validation or bounds checking. This overflow can corrupt memory, potentially allowing arbitrary code execution with the privileges of the httpd process. The attack vector requires no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability has been publicly disclosed, though no confirmed exploits in the wild have been reported yet. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. The affected product, Tenda F453, is a consumer-grade wireless router commonly used in residential and small office environments. The lack of available patches or official firmware updates at the time of disclosure increases the urgency for mitigations. This vulnerability could be leveraged to gain persistent control over the device, intercept or manipulate network traffic, or launch further attacks within the local network.

Potential Impact

The impact of CVE-2026-3165 is significant for organizations and individuals using the Tenda F453 router version 1.0.0.3. Exploitation can lead to remote code execution, allowing attackers to fully compromise the device. This could result in unauthorized access to internal networks, interception of sensitive data, disruption of network services, and use of the device as a foothold for lateral movement or botnet recruitment. The compromise of a network gateway device undermines the confidentiality, integrity, and availability of all connected systems. Small businesses and home users with limited security monitoring are particularly vulnerable. The public disclosure increases the likelihood of exploit development and automated scanning, raising the risk of widespread attacks. Without timely patching or mitigation, affected networks remain exposed to persistent threats and potential data breaches.

Mitigation Recommendations

1. Immediately isolate affected Tenda F453 devices from untrusted networks to prevent remote exploitation. 2. Monitor vendor communications for official firmware updates addressing CVE-2026-3165 and apply patches as soon as they become available. 3. If no patch is available, restrict access to the router’s management interface and the /goform/AdvSetWrlsafeset endpoint via firewall rules or network segmentation. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious HTTP requests targeting the vulnerable endpoint. 5. Change default credentials and disable remote management features if not required. 6. Conduct regular network scans to identify devices running vulnerable firmware versions. 7. Educate users about the risks of using outdated router firmware and encourage timely updates. 8. Consider replacing affected devices with models that have active security support if patches are not forthcoming.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-24T21:58:38.835Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6d86b7ef31ef0b587d3d

Added to database: 2/25/2026, 9:45:42 PM

Last enriched: 2/26/2026, 9:58:27 PM

Last updated: 4/12/2026, 10:01:49 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses