Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22079: CWE-319 Cleartext Transmission of Sensitive Information in Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router

0
High
VulnerabilityCVE-2026-22079cvecve-2026-22079cwe-319
Published: Fri Jan 09 2026 (01/09/2026, 11:02:50 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: 300Mbps Wireless Router F3 and N300 Easy Setup Router

Description

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the plaintext transmission of login credentials during the initial login or post-factory reset setup through the web-based administrative interface. An attacker on the same network could exploit this vulnerability by intercepting network traffic and capturing the credentials transmitted in plaintext. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unauthorized access to the targeted device.

AI-Powered Analysis

AILast updated: 01/09/2026, 11:23:35 UTC

Technical Analysis

CVE-2026-22079 is a vulnerability classified under CWE-319, which pertains to the cleartext transmission of sensitive information. This flaw exists in specific Tenda wireless routers, namely the 300Mbps Wireless Router F3 and N300 Easy Setup Router, across several firmware versions (F3 v3.0 Firmware versions 12.01.01.41 through 12.01.01.55 and F3 v4.0 Firmware V03.03.01.40). The vulnerability arises because the routers transmit login credentials in plaintext during the initial login process or immediately following a factory reset via their web-based administrative interface. Since the credentials are not encrypted, any attacker positioned on the same local network segment can perform network traffic interception (e.g., via ARP spoofing or packet sniffing) to capture these credentials. This enables the attacker to gain unauthorized administrative access to the router, which could lead to further compromise of the internal network, including traffic manipulation, device configuration changes, or deployment of malicious firmware. The CVSS 4.0 vector indicates the attack requires local network access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), but results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). No authentication or user interaction is needed, increasing the risk. Currently, no patches or official fixes have been published, and no exploits have been reported in the wild. The vulnerability is particularly critical in environments where these routers are deployed in shared or untrusted networks, such as public Wi-Fi or multi-tenant buildings.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for small and medium enterprises or home offices that rely on Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router models. Unauthorized access to the router can lead to interception and manipulation of internal network traffic, exposure of sensitive corporate data, and potential lateral movement within the network. In sectors with strict data protection regulations like GDPR, such unauthorized access could result in compliance violations and financial penalties. The vulnerability is particularly impactful in environments where multiple users share the same network segment, such as co-working spaces, hotels, or residential complexes. Additionally, critical infrastructure or public sector organizations using these devices may face increased risk of espionage or sabotage. The lack of encryption during credential transmission undermines trust in network perimeter defenses and could facilitate broader attacks if attackers gain persistent access to network devices.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate vulnerable Tenda routers on segmented networks to limit exposure to untrusted users and devices. Disable remote management features and restrict administrative access to trusted IP addresses only. Employ network monitoring tools to detect unusual access patterns or configuration changes on these routers. Where possible, replace affected devices with models from vendors that implement secure credential transmission protocols (e.g., HTTPS with TLS). Educate users about the risks of connecting to unsecured or shared networks where these routers are deployed. For environments requiring these routers, consider deploying VPNs or encrypted tunnels to protect management traffic. Regularly audit firmware versions and maintain an inventory of network devices to identify and prioritize vulnerable units. Stay alert for vendor updates or security advisories that may provide patches or firmware upgrades addressing this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-In
Date Reserved
2026-01-06T07:52:50.901Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960e1d7a48af7d8ce8b5d37

Added to database: 1/9/2026, 11:09:11 AM

Last enriched: 1/9/2026, 11:23:35 AM

Last updated: 1/10/2026, 10:09:46 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats