Description
This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection.

Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unau-thorized access to the targeted device.
Published: 2026-01-09
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Session hijacking and unauthorized administrative access
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from the fact that session cookies used by the web‐based administrative interface of the Tenda 300Mbps Wireless Router F3 and the N300 Easy Setup Router are not set with the HTTPOnly flag. Without this flag, the cookies can be read by client–side scripts or observed on the network if transmitted over plain HTTP, allowing a remote attacker to capture a valid session token. The attacker may then use the cookie to impersonate an authenticated administrator, gain privileged control over the device, and potentially read sensitive configuration data. This weakness is classified as CWE‑1004 – “Cookie Not Secure or HTTPOnly”.

Affected Systems

The affected products are the Tenda 300Mbps Wireless Router F3 and the N300 Easy Setup Router. No specific firmware version range is listed in the advisory, so all current models should be considered at risk until the vendor’s update is applied.

Risk and Exploitability

The CVSS score of 8.8 indicates a high impact vulnerability, while the very low EPSS score (<1%) suggests that widespread exploitation is currently unlikely. The advisory does not list this vulnerability in the CISA KEV catalog, which means it has not yet been observed in the wild. The attack surface is remote; an attacker only needs network access to the router’s web interface over HTTP, which is typically exposed on local or broader networks. Successful exploitation would grant the attacker administrator privileges, enabling configuration theft, persistence, or further lateral movement within the network.

Generated by OpenCVE AI on April 18, 2026 at 07:24 UTC.

Remediation

Vendor Solution

Apply appropriate updates as mentioned by the vendor: https://www.tendacn.com/in/material/show/724624313163845


OpenCVE Recommended Actions

  • Apply the vendor-published firmware update for the affected Tenda routers as outlined by the vendor documentation.
  • Restrict administrative access to the router’s web interface by disabling remote management when not required or limiting access to trusted IP addresses.
  • Monitor router logs for anomalous login attempts and enforce strong, regularly changed passwords to reduce the risk of successful session hijacking.

Generated by OpenCVE AI on April 18, 2026 at 07:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f3
Tenda n300
Vendors & Products Tenda
Tenda f3
Tenda n300

Fri, 09 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unau-thorized access to the targeted device.
Title Cookie without HTTPOnly Flag Vulnerability in Tenda Wireless Routers
Weaknesses CWE-1004
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2026-01-09T16:44:56.131Z

Reserved: 2026-01-06T07:52:50.901Z

Link: CVE-2026-22081

cve-icon Vulnrichment

Updated: 2026-01-09T16:44:39.580Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T12:15:54.260

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:30:36Z

Weaknesses