CVE-2026-3377

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the fromSafeUrlFilter function. This affects Tenda F453 routers running firmware version 1.0.0.3. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Tenda F453
Versions: 1.0.0.3
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version; other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Remote code execution allowing attackers to install malware, create backdoors, intercept network traffic, or use the device as part of a botnet.

🟢

If Mitigated

Limited impact if device is behind strict network segmentation and firewalls, though device compromise still possible.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing routers with public exploit available.
🏢 Internal Only: MEDIUM - Internal routers could still be exploited via internal network access or compromised systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on GitHub; remote exploitation without authentication makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates
2. Download latest firmware for F453
3. Access router admin interface
4. Upload and apply firmware update
5. Reboot router

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected routers from critical network segments

Access Control

linux

Restrict access to router admin interface to trusted IPs only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Replace affected routers with different models or brands
  • Implement strict network monitoring and intrusion detection for router traffic

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version is 1.0.0.3, device is vulnerable.

Check Version:

Check via router web interface at http://router_ip or using telnet/ssh if enabled

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.0.0.3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SafeUrlFilter
  • Buffer overflow error messages in router logs
  • Unexpected reboots or crashes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command and control communication
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND (uri="/goform/SafeUrlFilter" OR message="buffer overflow" OR message="segmentation fault")

🔗 References

📤 Share & Export