Description
A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Published: 2026-02-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The firmware of certain Tenda RX3 routers contains a flaw in the fromSetIpMacBind function, which processes inputs sent to the /goform/SetIpMacBind endpoint. The user-controlled argument list can overflow a local stack buffer, a classic stack-based buffer overflow (CWE‑119) that may corrupt adjacent data including return addresses (CWE‑121). If successfully exploited, an attacker could inject and execute arbitrary code on the device, giving full control of the router.

Affected Systems

The vulnerability affects the Tenda RX3 model running firmware version 16.03.13.11. Users of this particular build should check the firmware version on their device and verify whether the router’s SetIpMacBind interface is exposed.

Risk and Exploitability

The flaw carries a CVSS score of 8.7, indicating high severity, but its EPSS score is below 1 %, meaning it is not yet widely observed in the wild. The attack can be launched from any remote location that can reach the router’s web interface, and the exploit has already been publicly disclosed. Although the vulnerability is not yet listed in the CISA KEV catalog, the combination of remote accessibility and the potential for remote code execution warrants serious consideration.

Generated by OpenCVE AI on April 17, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware version that addresses this stack‑buffer overflow.
  • If an upgrade is unavailable, block or filter traffic to the /goform/SetIpMacBind endpoint using the router’s firewall or an external ACL.
  • Review and clean any unauthorized IP/MAC binding configurations, and restrict access to the configuration interface to trusted networks.

Generated by OpenCVE AI on April 17, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tenda:rx3_firmware:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda rx3 Firmware
CPEs cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11:*:*:*:*:*:*:*
Vendors & Products Tenda rx3 Firmware

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda rx3
Vendors & Products Tenda
Tenda rx3

Sun, 08 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Title Tenda RX3 SetIpMacBind fromSetIpMacBind stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:49:37.836Z

Reserved: 2026-02-07T17:16:24.891Z

Link: CVE-2026-2186

cve-icon Vulnrichment

Updated: 2026-02-09T21:08:22.347Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T21:15:48.297

Modified: 2026-02-10T14:54:48.300

Link: CVE-2026-2186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses