Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3729: Stack-based Buffer Overflow in Tenda F453

0
High
VulnerabilityCVE-2026-3729cvecve-2026-3729
Published: Sun Mar 08 2026 (03/08/2026, 10:32:12 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: F453

Description

A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:16:02 UTC

Technical Analysis

CVE-2026-3729 is a stack-based buffer overflow vulnerability identified in the Tenda F453 router firmware versions 1.0.0.3 and 3.As. The vulnerability resides in the fromPptpUserAdd function of the /goform/PPTPDClient endpoint, which processes parameters such as username and opttype. Improper validation or sanitization of these input arguments allows an attacker to overflow the stack buffer, potentially overwriting return addresses or control data. This flaw can be triggered remotely over the network without requiring authentication or user interaction, making it highly exploitable. The vulnerability's CVSS 4.0 score is 8.7, reflecting its high impact on confidentiality, integrity, and availability, as well as its ease of exploitation. Exploiting this vulnerability could enable attackers to execute arbitrary code with elevated privileges on the router, leading to device takeover, network traffic interception, or disruption of network services. Although no confirmed in-the-wild exploitation has been reported, a public exploit is available, increasing the urgency for mitigation. The lack of official patches at the time of publication necessitates alternative protective measures such as network segmentation, firewall rules, and intrusion detection. Given the critical role of routers in network infrastructure, this vulnerability poses a significant risk to organizations relying on Tenda F453 devices.

Potential Impact

The impact of CVE-2026-3729 is substantial for organizations using Tenda F453 routers. Successful exploitation can lead to full compromise of the router, allowing attackers to execute arbitrary code with elevated privileges. This can result in interception or manipulation of network traffic, unauthorized access to internal networks, disruption of internet connectivity, and potential pivoting to other internal systems. The confidentiality of sensitive data traversing the network may be breached, integrity of communications compromised, and availability of network services disrupted. Given that routers are critical infrastructure components, their compromise can have cascading effects on organizational security posture and operational continuity. The remote, unauthenticated nature of the exploit increases the likelihood of widespread attacks, especially if automated exploit tools are leveraged. Organizations in sectors with high reliance on secure network infrastructure, such as finance, healthcare, and government, face elevated risks. The absence of patches further exacerbates the threat, requiring immediate compensatory controls to mitigate potential damage.

Mitigation Recommendations

1. Immediately isolate affected Tenda F453 devices from untrusted networks to prevent remote exploitation. 2. Implement strict firewall rules to block access to the /goform/PPTPDClient endpoint or restrict management interfaces to trusted IP addresses only. 3. Monitor network traffic for unusual requests targeting the PPTPDClient endpoint or attempts to exploit buffer overflow patterns. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts against this vulnerability. 5. Disable PPTP VPN client functionality on the router if not required, reducing the attack surface. 6. Regularly check for firmware updates or security advisories from Tenda and apply patches promptly once available. 7. Consider replacing vulnerable devices with models from vendors with stronger security track records if patching is delayed. 8. Conduct network segmentation to limit lateral movement from compromised devices. 9. Educate network administrators on the risks and signs of exploitation to enhance incident response readiness. 10. Maintain backups of router configurations and logs to support forensic analysis and recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T17:44:44.935Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae16ab2904315ca310d443

Added to database: 3/9/2026, 12:39:07 AM

Last enriched: 3/16/2026, 9:16:02 AM

Last updated: 4/24/2026, 5:53:28 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses