CVE-2026-3169

A security vulnerability has been detected in Tenda F453 1.0.0.3. This impacts the function fromSafeEmailFilter of the file /goform/SafeEmailFilter of the component httpd. The manipulation of the argument page leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
References
Link Resource
https://github.com/Litengzheng/vul_db/blob/main/F453/vul_68/README.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.347676 Permissions Required VDB Entry
https://vuldb.com/?id.347676 Third Party Advisory VDB Entry
https://vuldb.com/?submit.759597 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-25 08:16

Updated : 2026-02-25 17:52


NVD link : CVE-2026-3169

Mitre link : CVE-2026-3169

CVE.ORG link : CVE-2026-3169


JSON object : View

Products Affected

tenda

  • f453_firmware
  • f453
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')