Description
This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the use of login credentials as the session ID through its web-based administrative interface. A remote attacker could exploit this vulnerability by intercepting network traffic and capturing the session ID during insecure transmission.

Successful exploitation of this vulnerability could allow the attacker to hijack an authenticated session and compromise sensitive configuration information on the targeted device.
Published: 2026-01-09
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Session hijacking via insecure login credentials
Action: Patch
AI Analysis

Impact

Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router use the user’s login credentials as the session ID for their web‑based administrative interface. Because the session ID is transmitted without encryption, an attacker on the same network can eavesdrop on traffic and capture the ID. The vulnerability is described as a CWE‑384, representing unauthorized use of credentials. Once the attacker has the session ID, they can hijack the authenticated session and read or modify sensitive configuration settings on the device.

Affected Systems

The affected products are the Tenda 300Mbps Wireless Router F3 and the N300 Easy Setup Router. No specific firmware or model version information is listed in the advisory.

Risk and Exploitability

The CVSS v3 score of 8.8 marks the issue as high severity. The EPSS score of less than 1 % indicates a low likelihood of widespread exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is remote, requiring network visibility to intercept traffic, so an attacker on the local network or with compromised devices can exploit it by simple packet sniffing. The combination of a severe impact and a very low exploit probability means the overall risk is moderate, but the potential damage to configuration confidentiality and integrity warrants timely remediation.

Generated by OpenCVE AI on April 18, 2026 at 07:23 UTC.

Remediation

Vendor Solution

Apply appropriate updates as mentioned by the vendor: https://www.tendacn.com/in/material/show/724624313163845


OpenCVE Recommended Actions

  • Update the router firmware to the latest version using the vendor advisory link
  • If a firmware update is not available, change the administrative login credentials and enable HTTPS for the admin interface if supported
  • Restrict access to the router’s web administration port by applying firewall rules or network segmentation to prevent eavesdropping

Generated by OpenCVE AI on April 18, 2026 at 07:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f3
Tenda n300
Vendors & Products Tenda
Tenda f3
Tenda n300

Fri, 09 Jan 2026 11:45:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the use of login credentials as the session ID through its web-based administrative interface. A remote attacker could exploit this vulnerability by intercepting network traffic and capturing the session ID during insecure transmission. Successful exploitation of this vulnerability could allow the attacker to hijack an authenticated session and compromise sensitive configuration information on the targeted device.
Title Insecure Session ID Management Vulnerability in Tenda Wireless Routers
Weaknesses CWE-384
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2026-01-09T16:26:14.019Z

Reserved: 2026-01-06T07:52:50.901Z

Link: CVE-2026-22082

cve-icon Vulnrichment

Updated: 2026-01-09T16:26:05.793Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T12:15:54.403

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:30:36Z

Weaknesses