Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22080: CWE-319 Cleartext Transmission of Sensitive Information in Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router

0
High
VulnerabilityCVE-2026-22080cvecve-2026-22080cwe-319
Published: Fri Jan 09 2026 (01/09/2026, 11:05:07 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: 300Mbps Wireless Router F3 and N300 Easy Setup Router

Description

This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the transmission of credentials encoded using reversible Base64 encoding through the web-based administrative interface. An attacker on the same network could exploit this vulnerability by intercepting network traffic and capturing the Base64-encoded credentials. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unauthorized access to the targeted device.

AI-Powered Analysis

AILast updated: 01/09/2026, 11:38:33 UTC

Technical Analysis

CVE-2026-22080 is a vulnerability categorized under CWE-319, which pertains to the cleartext transmission of sensitive information. Specifically, in Tenda's 300Mbps Wireless Router F3 and N300 Easy Setup Router models, certain firmware versions transmit administrative credentials encoded only with Base64 encoding over the network via the web-based management interface. Base64 encoding is not encryption but a reversible encoding scheme, meaning an attacker with network access can easily decode the credentials. This vulnerability arises because the routers do not properly secure the transmission channel or encrypt sensitive data, allowing an attacker on the same local area network (LAN) to perform a man-in-the-middle (MITM) attack or passive traffic capture to intercept these credentials. Once obtained, the attacker can gain unauthorized administrative access to the router, potentially altering configurations, intercepting or redirecting traffic, or launching further attacks within the network. The vulnerability affects multiple firmware versions of the F3 v3.0 and v4.0 models, indicating a persistent issue across releases. The CVSS 4.0 score of 8.7 reflects high severity, with an attack vector limited to adjacent network (AV:A), low attack complexity (AC:L), no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a prime candidate for exploitation in environments where these routers are deployed without additional network protections.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational integrity. Many small and medium enterprises (SMEs), as well as home offices, may use Tenda routers due to their affordability and ease of setup. An attacker gaining administrative access to these routers can manipulate network traffic, intercept sensitive communications, deploy malware, or create persistent backdoors. This can lead to data breaches, loss of confidentiality, disruption of business operations, and potential lateral movement within corporate networks. The impact is particularly critical for organizations handling sensitive personal data under GDPR, as unauthorized access could lead to regulatory penalties and reputational damage. Additionally, compromised routers can be leveraged as entry points for broader cyber espionage or ransomware campaigns targeting European infrastructure. The threat is amplified in environments where network segmentation is weak and monitoring is insufficient, allowing attackers to remain undetected after exploitation.

Mitigation Recommendations

1. Immediate firmware updates: Organizations should monitor Tenda's official channels for patches addressing this vulnerability and apply them promptly to affected devices. 2. Network segmentation: Isolate router management interfaces on separate VLANs or subnets accessible only to trusted administrators to reduce exposure to local attackers. 3. Use of secure management protocols: Where possible, disable web-based management or restrict it to HTTPS with strong encryption and authentication mechanisms. 4. Implement network monitoring: Deploy intrusion detection/prevention systems (IDS/IPS) to detect unusual traffic patterns or unauthorized access attempts targeting router management interfaces. 5. Replace vulnerable hardware: For critical environments, consider replacing affected Tenda models with routers from vendors with stronger security track records and timely patch management. 6. Educate users and administrators: Raise awareness about the risks of using default or weak router configurations and the importance of securing network devices. 7. Employ VPNs or encrypted tunnels for remote management to prevent credential interception over local networks. 8. Regularly audit network devices and configurations to identify and remediate insecure setups.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-In
Date Reserved
2026-01-06T07:52:50.901Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960e55ba48af7d8cea09102

Added to database: 1/9/2026, 11:24:11 AM

Last enriched: 1/9/2026, 11:38:33 AM

Last updated: 1/10/2026, 10:09:43 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats