Description
A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
Published: 2026-02-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the /goform/fast_setting_wifi_set function of Tenda RX3 firmware. By manipulating the ssid_5g parameter, an attacker can trigger the overflow remotely, potentially executing arbitrary code on the device. The vulnerability is publicly documented and an exploit is available, giving attackers a straightforward path to compromise the router’s control plane.

Affected Systems

The flaw affects the Tenda RX3 router, specifically firmware version 16.03.13.11. No other Tenda products or firmware revisions are mentioned as impacted in the available data.

Risk and Exploitability

The issue receives a high CVSS score of 8.7. The EPSS score is reported as less than 1%, indicating a low exploitation probability in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, relying on access to the router’s web interface; no local privileges are required. Attackers who succeed can gain full control of the device via the exposed endpoint.

Generated by OpenCVE AI on April 18, 2026 at 13:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the most recent Tenda RX3 firmware update that implements bounds checking for the ssid_5g parameter in /goform/fast_setting_wifi_set, addressing CWE‑119 and CWE‑121.
  • Until a firmware fix is applied, configure the router or upstream firewall to reject or truncate ssid_5g values longer than the defined limit, thereby mitigating the stack overflow identified as CWE‑121.
  • Block or disable the /goform/fast_setting_wifi_set endpoint or the router’s web interface from remote access to eliminate the attack vector, isolating the risk associated with the buffer overflow.
  • Optionally, monitor router logs for anomalous attempts to access the vulnerable endpoint and temporarily change or disable the 5‑GHz SSID while remediation is applied.

Generated by OpenCVE AI on April 18, 2026 at 13:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:rx3_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda rx3 Firmware
CPEs cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11:*:*:*:*:*:*:*
Vendors & Products Tenda rx3 Firmware

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda rx3
Vendors & Products Tenda
Tenda rx3

Sun, 08 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit is publicly available and might be used.
Title Tenda RX3 fast_setting_wifi_set stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:48:12.741Z

Reserved: 2026-02-07T15:19:12.136Z

Link: CVE-2026-2180

cve-icon Vulnrichment

Updated: 2026-02-09T17:12:08.119Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T20:15:51.043

Modified: 2026-02-10T14:43:41.317

Link: CVE-2026-2180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses