CVE-2026-3399

A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/Litengzheng/vul_db/blob/main/F453/vul_83/README.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.348294 Permissions Required VDB Entry
https://vuldb.com/?id.348294 Third Party Advisory VDB Entry
https://vuldb.com/?submit.759631 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-01 23:16

Updated : 2026-03-03 17:31


NVD link : CVE-2026-3399

Mitre link : CVE-2026-3399

CVE.ORG link : CVE-2026-3399


JSON object : View

Products Affected

tenda

  • f453_firmware
  • f453
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')