Impact
The vulnerability arises from the transmission of login credentials in cleartext during the initial configuration of Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router. This allows an attacker on the same local network to capture administrator usernames and passwords, resulting in potential unauthorized access to the device and exposure of sensitive information. The weakness is a cleartext transmission flaw, classified as CWE‑319.
Affected Systems
Affected models include Tenda’s 300 Mbps Wireless Router F3 and N300 Easy Setup Router. No additional version details are provided, so all firmware versions shipping these devices may be vulnerable until patched.
Risk and Exploitability
The CVSS score of 8.7 places the issue in the high severity category, yet the EPSS score is below 1 %, indicating a low probability of exploitation at present. The vendor has not listed this flaw in CISA’s KEV catalog, suggesting limited known exploitation. The likely attack vector is local network traffic interception, meaning only attackers physically present or having network access to the router’s LAN can leverage the flaw, and they must capture unencrypted HTTP traffic during setup.
OpenCVE Enrichment