{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-4553/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["cve-2026-4553","tenda","buffer-overflow","router"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA stack-based buffer overflow vulnerability, tracked as CVE-2026-4553, has been identified in Tenda F453 version 1.0.0.3. The flaw resides within the \u003ccode\u003efromNatlimit\u003c/code\u003e function of the \u003ccode\u003e/goform/Natlimit\u003c/code\u003e component\u0026rsquo;s Parameters Handler. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could allow an attacker to execute arbitrary code on the affected device. This vulnerability poses a significant threat to users of the Tenda F453 router, potentially…\u003c/p\u003e\n","date_modified":"2026-03-23T12:00:00Z","date_published":"2026-03-23T12:00:00Z","id":"/briefs/2026-03-tenda-stack-overflow/","summary":"A stack-based buffer overflow vulnerability exists in Tenda F453 version 1.0.0.3 in the fromNatlimit function of the /goform/Natlimit Parameters Handler component, triggered remotely by manipulating the 'page' argument, allowing for potential arbitrary code execution.","title":"Tenda F453 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-4553)","url":"https://feed.craftedsignal.io/briefs/2026-03-tenda-stack-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-4553","version":"https://jsonfeed.org/version/1.1"}