Description
Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password in plaintext. The endpoint also omits appropriate Cache-Control directives, which can allow the response to be stored in client-side caches and recovered by other local users or processes with access to cached browser data.
Published: 2026-02-23
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi allows the configuration download response to contain both the router password and the administrative password in plaintext, a flaw characterized by CWE‑201 Sensitive Information Exposure and CWE‑525 Stored Sensitive Information in Plaintext. The missing Cache‑Control headers mean the response can be stored in client‑side caches, providing a secondary leakage path where local users or processes with access to cached browser data can recover credentials. Attackers who can trigger the configuration download endpoint, or who later locate cached copies, can obtain confidential credentials that could be used to upload firmware, modify settings, or pivot to other parts of the home network.

Affected Systems

The affected product is the Tenda F3 wireless router from Shenzhen Tenda Technology Co., Ltd. The specific firmware revision documented as vulnerable is V12.01.01.55_multi. No other versions are listed as affected in the current advisory.

Risk and Exploitability

The CVSS base score of 7.1 indicates a high severity of confidentiality breach. The EPSS score of less than 1% suggests that, while the vulnerability is serious, its exploitation probability is currently very low. The vulnerability is not listed in the CISA KEV catalog. Exploitation likely requires the attacker to possess network access to the router and be able to trigger the configuration download endpoint; it may also be leveraged by anyone who obtains cached configuration data locally. No additional exploitation conditions are documented, so the primary risk is disclosure of credentials rather than denial‑of‑service or remote code execution.

Generated by OpenCVE AI on April 17, 2026 at 16:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda F3 firmware update that removes the plaintext credentials from the configuration download response, addressing the CWE‑201 and CWE‑525 weaknesses.
  • Restrict access to the configuration download endpoint so that only authenticated administrative sessions can invoke it, preventing unauthenticated users from triggering the exploit.
  • Ensure the endpoint returns appropriate Cache‑Control headers (e.g., no-cache, max-age=0) or otherwise prevent caching of the configuration data, stopping credential leakage via client‑side caches.

Generated by OpenCVE AI on April 17, 2026 at 16:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda f3
Tenda f3 Firmware
CPEs cpe:2.3:h:tenda:f3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda f3
Tenda f3 Firmware

Mon, 23 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password in plaintext. The endpoint also omits appropriate Cache-Control directives, which can allow the response to be stored in client-side caches and recovered by other local users or processes with access to cached browser data.
Title Tenda F3 Plaintext Credential Exposure in Configuration Download
Weaknesses CWE-201
CWE-525
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-11T23:11:27.235Z

Reserved: 2026-02-19T19:51:07.328Z

Link: CVE-2026-27514

cve-icon Vulnrichment

Updated: 2026-02-23T18:30:37.444Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T17:23:30.087

Modified: 2026-02-23T20:11:48.337

Link: CVE-2026-27514

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses