CVE-2026-4552
Stack-Based Buffer Overflow in Tenda F453 Parameters Handler
Publication date: 2026-03-22
Last updated on: 2026-04-02
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | f453_firmware | 1.0.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-4552 is a stack-based buffer overflow vulnerability in the Tenda F453 router, version 1.0.0.3. It occurs in the fromVirtualSer function of the httpd service, which processes a user-supplied parameter named "page". This parameter is passed to the sprintf function without any bounds checking, allowing an attacker to overflow the stack buffer by sending an excessively long "page" value in a POST request to the /goform/VirtualSer endpoint.'}, {'type': 'paragraph', 'content': 'This vulnerability can be exploited remotely and may lead to denial of service or remote code execution on the affected device.'}] [1]
How can this vulnerability impact me? :
Exploiting this vulnerability can allow an attacker to cause a denial of service or execute arbitrary code remotely on the affected Tenda F453 router. This means the attacker could disrupt network connectivity or potentially take control of the device, leading to further compromise of the network or connected systems.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending a specially crafted POST request to the /goform/VirtualSer endpoint of the Tenda F453 router running version 1.0.0.3. The request should include an excessively long "page" parameter to test for a stack-based buffer overflow.'}, {'type': 'paragraph', 'content': 'A detection command example using curl would be:'}, {'type': 'list_item', 'content': 'curl -X POST http://<target-ip>/goform/VirtualSer -d "page=$(python3 -c \'print("A"*1000)\')"'}, {'type': 'paragraph', 'content': 'If the device crashes, becomes unresponsive, or exhibits abnormal behavior after this request, it indicates the presence of the vulnerability.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Restrict remote access to the affected device, especially blocking access to the /goform/VirtualSer endpoint.
- Apply any available firmware updates from Tenda that address this vulnerability.
- If firmware updates are not available, consider disabling the vulnerable service or isolating the device from untrusted networks.
- Monitor network traffic for suspicious POST requests targeting the /goform/VirtualSer endpoint with unusually long parameters.