Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3399: Buffer Overflow in Tenda F453

0
High
VulnerabilityCVE-2026-3399cvecve-2026-3399
Published: Sun Mar 01 2026 (03/01/2026, 23:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: F453

Description

CVE-2026-3399 is a high-severity buffer overflow vulnerability in the Tenda F453 router firmware version 1. 0. 0. 3. The flaw exists in the httpd component's fromGstDhcpSetSer function, specifically in the handling of the 'dips' argument, which can be manipulated remotely to trigger the overflow. Exploitation does not require user interaction or elevated privileges, making it remotely exploitable over the network. The vulnerability can lead to complete compromise of the device, affecting confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of active attacks. Organizations using this router model are at risk of unauthorized access, device takeover, or network disruption. Immediate patching or mitigation is critical to prevent exploitation.

AI-Powered Analysis

AILast updated: 03/01/2026, 23:25:26 UTC

Technical Analysis

CVE-2026-3399 identifies a buffer overflow vulnerability in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the fromGstDhcpSetSer function within the httpd component, specifically in the processing of the 'dips' argument passed to the /goform/GstDhcpSetSer endpoint. Improper validation or bounds checking of this argument allows an attacker to overflow a buffer, potentially overwriting adjacent memory. This can lead to arbitrary code execution or denial of service on the device. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS score of 8.7 (high severity) reflects the critical impact on confidentiality, integrity, and availability, with a low attack complexity and no user interaction needed. While no active exploitation has been reported, a public exploit exists, increasing the likelihood of future attacks. The affected product is a widely used consumer and small office router, making this vulnerability a significant risk for network security. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The exploitation of this buffer overflow vulnerability can have severe consequences for organizations using the Tenda F453 router. Attackers can gain unauthorized remote code execution capabilities, allowing them to take full control of the device. This can lead to interception or manipulation of network traffic, insertion of malicious payloads, lateral movement within internal networks, and disruption of network availability. Confidential data passing through the router may be compromised, and the integrity of network communications can be undermined. The availability of the router can also be affected, resulting in denial of service conditions. Given the router’s role as a network gateway, successful exploitation can serve as a foothold for broader network compromise. Organizations relying on this device for critical connectivity or security functions face increased risk of operational disruption and data breaches.

Mitigation Recommendations

1. Immediate firmware update: Organizations should monitor Tenda’s official channels for a security patch addressing CVE-2026-3399 and apply it as soon as it becomes available. 2. Network segmentation: Isolate vulnerable Tenda F453 devices from critical network segments to limit potential lateral movement if compromised. 3. Access control: Restrict remote management access to the router’s administrative interfaces, ideally limiting access to trusted IP addresses or disabling remote management entirely. 4. Intrusion detection: Deploy network monitoring and intrusion detection systems to identify unusual traffic patterns or exploit attempts targeting the /goform/GstDhcpSetSer endpoint. 5. Temporary workaround: If patching is not immediately possible, consider disabling or filtering HTTP requests to the vulnerable endpoint at the network perimeter or firewall level. 6. Device replacement: For environments where security is paramount and patching is delayed, consider replacing affected devices with models from vendors with timely security support. 7. Regular audits: Conduct periodic security assessments of network devices to detect unpatched vulnerabilities and unauthorized configuration changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-01T06:34:46.523Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a4c78f32ffcdb8a20b0e7d

Added to database: 3/1/2026, 11:11:11 PM

Last enriched: 3/1/2026, 11:25:26 PM

Last updated: 3/2/2026, 12:44:47 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses