CVE-2026-4552

| EUVD-2026-14313 HIGH
2026-03-22 VulDB GHSA-hwc3-99fx-qcgr
7.4
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

4
PoC Detected
Apr 02, 2026 - 20:50 vuln.today
Public exploit code
Analysis Generated
Mar 22, 2026 - 14:45 vuln.today
EUVD ID Assigned
Mar 22, 2026 - 14:45 euvd
EUVD-2026-14313
CVE Published
Mar 22, 2026 - 14:31 nvd
HIGH 7.4

Description

A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

Analysis

Stack-based buffer overflow in Tenda F453 firmware version 1.0.0.3 allows remote attackers to achieve complete system compromise through manipulation of the page parameter in the VirtualSer handler. Public exploit code exists for this vulnerability, and no patch is currently available. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all Tenda F453 devices running firmware 1.0.0.3 in your environment and isolate them from critical network segments. Within 7 days: Implement compensating controls including network access restrictions, disable the VirtualSer feature if operationally feasible, and deploy WAF rules blocking /goform/VirtualSer requests. …

Sign in for detailed remediation steps.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +37
POC: +20

Share

CVE-2026-4552 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy