CVE-2026-3275

A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Executing a manipulation of the argument entrys can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/Litengzheng/vul_db/blob/main/F453/vul_75/README.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.347999 Permissions Required VDB Entry
https://vuldb.com/?id.347999 Third Party Advisory VDB Entry
https://vuldb.com/?submit.759622 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-27 02:16

Updated : 2026-02-27 15:46


NVD link : CVE-2026-3275

Mitre link : CVE-2026-3275

CVE.ORG link : CVE-2026-3275


JSON object : View

Products Affected

tenda

  • f453_firmware
  • f453
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')