Vulnerability Description
A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | F453 Firmware | 1.0.0.3 |
| Tenda | F453 | - |
Related Weaknesses (CWE)
References
- https://github.com/Litengzheng/vul_db/blob/main/F453/vul_99/README.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.349710Permissions RequiredVDB Entry
- https://vuldb.com/?id.349710Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.767222Third Party AdvisoryVDB Entry
- https://www.tenda.com.cn/Product
FAQ
What is CVE-2026-3732?
CVE-2026-3732 is a vulnerability with a CVSS score of 8.8 (HIGH). A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer...
How severe is CVE-2026-3732?
CVE-2026-3732 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3732?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda F453 Firmware, Tenda F453.