Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2187: Stack-based Buffer Overflow in Tenda RX3

0
High
VulnerabilityCVE-2026-2187cvecve-2026-2187
Published: Sun Feb 08 2026 (02/08/2026, 21:02:11 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: RX3

Description

CVE-2026-2187 is a high-severity stack-based buffer overflow vulnerability in the Tenda RX3 router firmware version 16. 03. 13. 11. It arises from improper handling of the argument list in the set_qosMib_list function within the /goform/formSetQosBand endpoint. The vulnerability can be exploited remotely without authentication or user interaction, potentially allowing attackers to execute arbitrary code or cause denial of service. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of exploitation. European organizations using Tenda RX3 routers are at risk, especially those with exposed management interfaces. Mitigation requires applying firmware updates once available or implementing network-level protections to restrict access to the vulnerable endpoint. Countries with higher Tenda RX3 deployment and critical infrastructure relying on these devices are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/08/2026, 21:30:48 UTC

Technical Analysis

CVE-2026-2187 is a stack-based buffer overflow vulnerability identified in the Tenda RX3 router firmware version 16.03.13.11. The flaw exists in the set_qosMib_list function, which is part of the /goform/formSetQosBand web endpoint responsible for configuring QoS parameters. The vulnerability is triggered by manipulating the argument list passed to this function, causing a buffer overflow on the stack. This overflow can corrupt the execution stack, enabling remote attackers to execute arbitrary code or crash the device, leading to denial of service. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no active exploitation in the wild has been reported, a public exploit is available, increasing the likelihood of future attacks. The vulnerability affects only firmware version 16.03.13.11, so other versions may not be vulnerable. The lack of official patches at the time of publication necessitates interim mitigations. The vulnerability's presence in a widely deployed consumer and small business router model raises concerns about potential compromise of home and enterprise networks, especially where these devices serve as gateways or are exposed to untrusted networks.

Potential Impact

For European organizations, exploitation of CVE-2026-2187 could lead to full compromise of affected Tenda RX3 routers, resulting in unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of network availability. This can facilitate lateral movement by attackers, data exfiltration, or launching further attacks against connected systems. Small and medium enterprises, as well as home office environments relying on Tenda RX3 devices, are particularly vulnerable due to typically weaker perimeter defenses. Critical infrastructure sectors using these routers risk operational disruptions and potential safety hazards. The remote, unauthenticated nature of the exploit increases the attack surface, especially for devices with exposed management interfaces or insufficient network segmentation. The public availability of an exploit increases the urgency, as automated scanning and exploitation campaigns could target these devices. The impact extends beyond individual organizations to national cybersecurity posture, given the potential for widespread compromise of network infrastructure.

Mitigation Recommendations

1. Immediately audit network environments to identify Tenda RX3 devices running firmware version 16.03.13.11. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules to block external access to the /goform/formSetQosBand endpoint. 3. Disable remote management features on affected devices if not strictly necessary. 4. Monitor network traffic for unusual activity indicative of exploitation attempts targeting the vulnerable endpoint. 5. Apply firmware updates from Tenda as soon as they become available; if no official patch exists, consider temporary device replacement or isolation. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or exploit patterns. 7. Educate users and administrators about the risk and signs of compromise related to this vulnerability. 8. For critical environments, consider deploying network-level mitigations such as web application firewalls (WAF) to block malicious requests targeting the vulnerable function. 9. Maintain regular backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T17:16:30.200Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988fd204b57a58fa1ce2187

Added to database: 2/8/2026, 9:16:16 PM

Last enriched: 2/8/2026, 9:30:48 PM

Last updated: 2/8/2026, 10:40:50 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats