CVE-2026-2181
8.8 HIGHPublished 2026-02-08 · Modified 2026-02-09 · Undergoing Analysis
Quick Summary
A critical vulnerability exists in the Tenda RX3 router's web interface. Attackers can remotely crash the device or execute malicious code by sending specially crafted data to a specific management page.
Who is affected
Users of Tenda RX3 router firmware version 16.03.13.11 are affected. A successful attack could allow an attacker to take full control of the router from the internet.
Recommended fix
Immediately update the router's firmware to a version newer than 16.03.13.11, if available from Tenda. If no patch exists, disable remote (WAN) management and restrict access to the router's admin interface.
Technical Description
A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
CVSS Details
Attack Vector
NETWORK
Complexity
LOW
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE
CWE-119, CWE-121