Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3377: Buffer Overflow in Tenda F453

0
High
VulnerabilityCVE-2026-3377cvecve-2026-3377
Published: Sat Feb 28 2026 (02/28/2026, 23:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: F453

Description

CVE-2026-3377 is a high-severity buffer overflow vulnerability in the Tenda F453 router firmware version 1. 0. 0. 3. The flaw exists in the fromSafeUrlFilter function within the /goform/SafeUrlFilter endpoint, where manipulation of the 'page' argument can trigger a buffer overflow. This vulnerability can be exploited remotely without authentication or user interaction, potentially allowing attackers to execute arbitrary code or cause denial of service. Although no public exploits are currently observed in the wild, a proof-of-concept exploit is publicly available, increasing the risk of exploitation. Organizations using this router model are at risk of compromise, especially those with internet-exposed devices. Immediate mitigation steps should be taken to reduce exposure. The vulnerability impacts confidentiality, integrity, and availability due to its potential for remote code execution and system disruption.

AI-Powered Analysis

AILast updated: 02/28/2026, 23:55:23 UTC

Technical Analysis

CVE-2026-3377 identifies a buffer overflow vulnerability in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the fromSafeUrlFilter function located in the /goform/SafeUrlFilter endpoint. Specifically, the issue arises when the 'page' argument is manipulated by an attacker, causing a buffer overflow condition. Buffer overflows occur when data exceeds the allocated buffer size, leading to memory corruption. This can enable attackers to overwrite critical memory areas, potentially allowing arbitrary code execution or causing the device to crash, resulting in denial of service. The attack vector is remote network access, requiring no authentication or user interaction, which significantly lowers the barrier to exploitation. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no confirmed exploits in the wild are reported, a public exploit is available, increasing the likelihood of active exploitation attempts. The vulnerability affects only firmware version 1.0.0.3, and no patch links are currently provided, indicating that users must rely on vendor updates or mitigations. This vulnerability is critical for environments where Tenda F453 routers are deployed, especially those exposed to untrusted networks or the internet.

Potential Impact

The impact of CVE-2026-3377 is significant for organizations using the Tenda F453 router with vulnerable firmware. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the device. This compromises the confidentiality of network traffic, integrity of device configurations, and availability of network services. Attackers could use the compromised router as a foothold to launch further attacks within the internal network, intercept sensitive communications, or disrupt network connectivity. The lack of authentication and user interaction requirements increases the risk of automated exploitation and worm-like propagation. Organizations with internet-facing Tenda F453 devices are particularly vulnerable to attacks that could result in data breaches, network outages, or inclusion in botnets. The absence of an official patch at the time of disclosure further exacerbates the risk, making timely mitigation critical to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2026-3377, organizations should first identify all Tenda F453 routers running firmware version 1.0.0.3 within their environment. Until an official patch is released, network administrators should restrict access to the /goform/SafeUrlFilter endpoint by implementing firewall rules or access control lists (ACLs) to block external and untrusted internal network traffic to the device's management interface. Disabling remote management features on the router can reduce exposure. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts. Employing network segmentation to isolate vulnerable devices from critical infrastructure limits potential lateral movement. Organizations should engage with Tenda support channels to obtain firmware updates or advisories and apply patches promptly once available. Additionally, consider replacing affected devices with models that have active security support if patching is not feasible. Regularly updating router firmware and maintaining an inventory of network devices will aid in proactive vulnerability management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-28T06:55:33.988Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a37d1832ffcdb8a2775af2

Added to database: 2/28/2026, 11:41:12 PM

Last enriched: 2/28/2026, 11:55:23 PM

Last updated: 3/1/2026, 1:56:05 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses