Description
A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-02-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the set_device_name operation of the MAC Filtering Configuration Endpoint on certain Tenda RX3 routers. The flaw allows an attacker to supply an overly long devName parameter, causing an uncontrolled write on the stack. The vulnerability is characterized as a classic out‑of‑bounds write (CWE‑119) and a stack corruption (CWE‑121), potentially enabling arbitrary code execution or system compromise from a remote source.

Affected Systems

The impact is limited to Tenda RX3 devices running firmware version 16.03.13.11. No other Tenda products or firmware versions were explicitly listed as affected.

Risk and Exploitability

With a CVSS score of 8.7 the flaw is considered high severity. The EPSS score is below 1 percent, indicating a low likelihood of current exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires only a crafted HTTP request to the /goform/setBlackRule endpoint. Based on the description, it is inferred that the attack can be carried out over the network without local presence. The combination of high impact and low exploitation probability places the risk in a cautionary zone, but the potential for remote code execution warrants swift action.

Generated by OpenCVE AI on April 18, 2026 at 18:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router to the latest official firmware released by Tenda that addresses the stack overflow in the setBlackRule endpoint.
  • Disable MAC filtering temporarily to eliminate the vulnerable endpoint until the firmware update can be applied.
  • Restart the router after applying the firmware update to ensure the patch takes effect.

Generated by OpenCVE AI on April 18, 2026 at 18:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:rx3_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda rx3 Firmware
CPEs cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11:*:*:*:*:*:*:*
Vendors & Products Tenda rx3 Firmware

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda rx3
Vendors & Products Tenda
Tenda rx3

Sun, 08 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title Tenda RX3 MAC Filtering Configuration Endpoint setBlackRule set_device_name stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:49:21.723Z

Reserved: 2026-02-07T15:29:25.365Z

Link: CVE-2026-2185

cve-icon Vulnrichment

Updated: 2026-02-09T21:07:54.217Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T21:15:48.120

Modified: 2026-02-10T14:54:35.470

Link: CVE-2026-2185

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:30:07Z

Weaknesses