


Perceptive Security
SOC/SIEM Consultancy

A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulat…
Published:
7 March 2026 at 23:00:00
Alert date:
8 March 2026 at 10:01:22
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A stack-based buffer overflow vulnerability has been discovered in Tenda F453 router firmware version 1.0.0.3. The vulnerability affects the fromwebExcptypemanFilter function in the /goform/webExcptypemanFilter file. The flaw can be exploited by manipulating the 'page' argument, leading to a stack-based buffer overflow condition. The attack can be initiated remotely, making it particularly dangerous for exposed devices. The exploit has been publicly disclosed and is available for use, increasing the risk of active exploitation. This vulnerability poses a significant security risk to affected Tenda router users.
Technical details
Mitigation steps:
Affected products:
Tenda F453
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3726
https://github.com/Litengzheng/vul_db/blob/main/F453/vul_85/README.md
https://vuldb.com/?ctiid.349704
https://vuldb.com/?id.349704
https://vuldb.com/?submit.766931
https://www.tenda.com.cn/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
