Description
Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a content-type confusion vulnerability in the administrative interface. Responses omit the X-Content-Type-Options: nosniff header and include attacker-influenced content that can be reflected into the response body. Under affected browser behaviors, MIME sniffing may cause the response to be interpreted as active HTML, enabling script execution in the context of the administrative interface.
Published: 2026-02-23
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Browser-based Script Execution
Action: Update Firmware
AI Analysis

Impact

The vulnerability is a content-type confusion flaw in the administrative interface of Shenzhen Tenda F3 routers. Responses omit the X-Content-Type-Options: nosniff header and contain attacker-controlled content that is reflected into the response body. When a browser performs MIME sniffing, the response can be rendered as active HTML, allowing injected scripts to run within the context of the router’s administrative UI. This grants an attacker the ability to execute arbitrary JavaScript with the authority of the admin session, potentially leading to privilege escalation, data exfiltration, or further compromise of the device. The weakness aligns with CWE‑79 (Cross‑Site Scripting) and CWE‑116 (Wrong Type Functionality).

Affected Systems

Shenzhen Tenda Technology Co., Ltd. Tenda F3 wireless routers, specifically firmware version V12.01.01.55_multi. No other affected product versions are listed.

Risk and Exploitability

The CVSS score is 5.1, indicating moderate severity, and the EPSS score is below 1%, suggesting a low probability of exploitation. The vulnerability is not present in the CISA KEV catalog. The likely attack vector is via the web-based admin interface accessed from a browser; an attacker must deliver a crafted request or entice an administrator to visit a malicious URL that triggers the reflected content. Because the flaw hinges on browser MIME sniffing behavior, its exploitation would be most effective against browsers that do not enforce nosniff defaults.

Generated by OpenCVE AI on April 18, 2026 at 11:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware release from Tenda that adds the X-Content-Type-Options: nosniff header to administrative responses.
  • Limit access to the router’s administrative interface to trusted networks or VPN connections so only authorized administrators can reach it.
  • Use an HTTPS connection for the web interface and enforce TLS to prevent man‑in‑the‑middle injection or downgrade attacks.

Generated by OpenCVE AI on April 18, 2026 at 11:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f3
Tenda f3 Firmware
CPEs cpe:2.3:h:tenda:f3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f3
Tenda f3 Firmware

Mon, 23 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a content-type confusion vulnerability in the administrative interface. Responses omit the X-Content-Type-Options: nosniff header and include attacker-influenced content that can be reflected into the response body. Under affected browser behaviors, MIME sniffing may cause the response to be interpreted as active HTML, enabling script execution in the context of the administrative interface.
Title Tenda F3 Reflected Script Execution via Missing nosniff Header
Weaknesses CWE-116
CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:31:20.819Z

Reserved: 2026-02-19T19:51:07.328Z

Link: CVE-2026-27512

cve-icon Vulnrichment

Updated: 2026-02-23T18:37:34.501Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T17:23:29.687

Modified: 2026-02-23T20:16:05.237

Link: CVE-2026-27512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses