No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:tenda:f453:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:f453_firmware:1.0.0.3:*:*:*:*:*:*:* |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda f453
|
|
| Vendors & Products |
Tenda f453
|
Fri, 27 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Executing a manipulation of the argument entrys can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. | |
| Title | Tenda F453 httpd addressNat fromAddressNat buffer overflow | |
| First Time appeared |
Tenda
Tenda f453 Firmware |
|
| Weaknesses | CWE-119 CWE-120 |
|
| CPEs | cpe:2.3:o:tenda:f453_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda f453 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-27T01:32:10.129Z
Reserved: 2026-02-26T15:16:37.337Z
Link: CVE-2026-3275
No data.
Status : Analyzed
Published: 2026-02-27T02:16:20.747
Modified: 2026-02-27T15:46:20.130
Link: CVE-2026-3275
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:12:28Z