CVE-2026-3169

A security vulnerability has been detected in Tenda F453 1.0.0.3. This impacts the function fromSafeEmailFilter of the file /goform/SafeEmailFilter of the component httpd. The manipulation of the argument page leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
References
Link Resource
https://github.com/Litengzheng/vul_db/blob/main/F453/vul_68/README.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.347676 Permissions Required VDB Entry
https://vuldb.com/?id.347676 Third Party Advisory VDB Entry
https://vuldb.com/?submit.759597 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*

History

25 Feb 2026, 17:52

Type Values Removed Values Added
First Time Tenda
Tenda f453 Firmware
Tenda f453
CPE cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:*
References () https://github.com/Litengzheng/vul_db/blob/main/F453/vul_68/README.md - () https://github.com/Litengzheng/vul_db/blob/main/F453/vul_68/README.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.347676 - () https://vuldb.com/?ctiid.347676 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.347676 - () https://vuldb.com/?id.347676 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.759597 - () https://vuldb.com/?submit.759597 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

25 Feb 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 08:16

Updated : 2026-02-25 17:52


NVD link : CVE-2026-3169

Mitre link : CVE-2026-3169

CVE.ORG link : CVE-2026-3169


JSON object : View

Products Affected

tenda

  • f453_firmware
  • f453
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')