Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
Tenda F453 Router: Remote Code Execution Through DHCP Settings
CVE-2026-3399
Summary
A vulnerability in the Tenda F453 router's DHCP settings can be exploited remotely, allowing an attacker to potentially execute malicious code. This could lead to unauthorized access and control of the router. To protect your network, update your Tenda F453 to the latest available firmware version.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| tenda | f453_firmware | 1.0.0.3 | – |
Original title
A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of ...
Original description
A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
nvd CVSS2.0
9.0
nvd CVSS3.1
8.8
nvd CVSS4.0
7.4
Vulnerability type
CWE-119
Buffer Overflow
CWE-120
Classic Buffer Overflow
- https://github.com/Litengzheng/vul_db/blob/main/F453/vul_83/README.md Exploit Third Party Advisory
- https://vuldb.com/?ctiid.348294 Permissions Required VDB Entry
- https://vuldb.com/?id.348294 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.759631 Third Party Advisory VDB Entry
- https://www.tenda.com.cn/ Product
Published: 1 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026