CVE-2026-3376

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the SafeMacFilter function. This affects Tenda F453 router version 1.0.0.3. Attackers can exploit this without authentication to potentially take control of affected devices.

💻 Affected Systems

Products:
  • Tenda F453
Versions: 1.0.0.3
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Router compromise allowing traffic interception, DNS hijacking, or botnet recruitment.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing devices immediate targets.
🏢 Internal Only: MEDIUM - Internal devices still vulnerable to internal attackers or compromised hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists in GitHub repositories, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router administration interface

Network segmentation

all

Isolate router management interface to separate VLAN

🧯 If You Can't Patch

  • Replace vulnerable devices with patched or different models
  • Implement strict firewall rules blocking all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 1.0.0.3, device is vulnerable.

Check Version:

Check via router web interface at 192.168.0.1 or 192.168.1.1 under System Status or Firmware section

Verify Fix Applied:

Verify firmware version has changed from 1.0.0.3 to a newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SafeMacFilter
  • Multiple failed buffer overflow attempts in logs

Network Indicators:

  • Unusual traffic patterns to router management interface
  • Suspicious payloads in HTTP requests

SIEM Query:

source_ip="*" AND dest_ip="router_ip" AND url_path="/goform/SafeMacFilter" AND http_method="POST"

🔗 References

📤 Share & Export