CVE-2026-2181

8.8 HIGH

Published 2026-02-08 · Modified 2026-02-09 · Undergoing Analysis

Quick Summary

A critical vulnerability exists in the Tenda RX3 router's web interface. Attackers can remotely crash the device or execute malicious code by sending specially crafted data to a specific management page.

Who is affected

Users of Tenda RX3 router firmware version 16.03.13.11 are affected. A successful attack could allow an attacker to take full control of the router from the internet.

Recommended fix

Immediately update the router's firmware to a version newer than 16.03.13.11, if available from Tenda. If no patch exists, disable remote (WAN) management and restrict access to the router's admin interface.

Technical Description

A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

CVSS Details

Attack Vector

NETWORK

Complexity

LOW

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CWE

CWE-119, CWE-121

References