TopVuln

High-risk vulnerability digests

CVE-2026-5021

  • HIGH

Details

CVSS v3
8.8
CVSS v4
7.4
CVSS v2
9.0
NVD published
2026-03-29 02:16:17
Affected versions
Tenda F453 1.0.0.3
Summary
This is a remotely exploitable stack-based buffer overflow vulnerability in Tenda F453 routers. It occurs in the fromPPTPUserSetting function of the httpd component, where malicious manipulation of the delno argument triggers memory corruption. Exploit code for this vulnerability is publicly available.
Remediation
Check for official firmware updates from Tenda for the affected F453 device and install any available security patches immediately. If no patch is available, restrict management interface access to only trusted internal networks. Consider replacing unsupported devices to eliminate exposure.
Exploit info
The exploit has been released to the public; public references are available at https://app.opencve.io/cve/CVE-2026-5021 or https://vulners.com/cve/CVE-2026-5021. | Potential exploit details can be searched in Exploit-DB or GitHub: https://www.exploit-db.com/search?cve=CVE-2026-5021 | https://github.com/search?q=CVE-2026-5021+exploit

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.