Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unau-thorized access to the targeted device.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Apply appropriate updates as mentioned by the vendor: https://www.tendacn.com/in/material/show/724624313163845
Workaround
No workaround given by the vendor.
Fri, 09 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda f3 Tenda n300 |
|
| Vendors & Products |
Tenda
Tenda f3 Tenda n300 |
Fri, 09 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unau-thorized access to the targeted device. | |
| Title | Cookie without HTTPOnly Flag Vulnerability in Tenda Wireless Routers | |
| Weaknesses | CWE-1004 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2026-01-09T16:44:56.131Z
Reserved: 2026-01-06T07:52:50.901Z
Link: CVE-2026-22081
Updated: 2026-01-09T16:44:39.580Z
Status : Received
Published: 2026-01-09T12:15:54.260
Modified: 2026-01-09T12:15:54.260
Link: CVE-2026-22081
No data.
OpenCVE Enrichment
Updated: 2026-01-09T13:23:35Z