CVE-2026-3169

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the SafeEmailFilter function. This affects Tenda F453 router users running firmware version 1.0.0.3. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Tenda F453
Versions: 1.0.0.3
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the httpd component specifically in the SafeEmailFilter functionality. All devices running this firmware version are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Router takeover allowing traffic interception, DNS manipulation, credential theft, and deployment of persistent malware.

🟢

If Mitigated

Limited impact if device is behind firewall with strict inbound rules and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub. The buffer overflow manipulation is straightforward once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router administration interface

Network Segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace vulnerable router with different model
  • Implement strict firewall rules blocking all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 1.0.0.3, device is vulnerable.

Check Version:

Check via router web interface at 192.168.0.1 or 192.168.1.1 under System Status or Firmware Information

Verify Fix Applied:

Verify firmware version has changed from 1.0.0.3 to a newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/SafeEmailFilter with manipulated page parameter
  • Router crash/restart logs
  • Unusual outbound connections from router

Network Indicators:

  • HTTP traffic to router management interface with abnormal parameter lengths
  • Unexpected router reboots
  • Suspicious traffic patterns originating from router

SIEM Query:

source="router_logs" AND (uri="/goform/SafeEmailFilter" AND param_length>normal) OR (event="crash" AND device="router")

🔗 References

📤 Share & Export