CVE-2026-22081: CWE-1004 - Sensitive Cookie Without HttpOnly Flag in Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router
This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unau-thorized access to the targeted device.
AI Analysis
Technical Summary
CVE-2026-22081 is a vulnerability classified under CWE-1004 (Sensitive Cookie Without HttpOnly Flag) affecting Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router models. The root cause is the absence of the HttpOnly attribute on session cookies used by the routers' web-based administrative interfaces. Without the HttpOnly flag, these cookies are accessible to client-side scripts, increasing the risk of session hijacking via cross-site scripting (XSS) or network interception. Additionally, the administrative interface transmits these cookies over unencrypted HTTP connections, enabling remote attackers to capture session cookies through network sniffing or man-in-the-middle attacks. Successful exploitation allows attackers to impersonate legitimate administrators, gaining unauthorized control over router settings, potentially leading to network compromise, traffic interception, or persistent backdoors. The vulnerability affects several firmware versions of the F3 model (v3.0) and one version of the F4 model (v4.0). The CVSS 4.0 base score is 8.8, reflecting high severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality. Although no public exploits are reported yet, the vulnerability's nature makes it a significant risk, especially in environments where these routers are deployed without additional network protections.
Potential Impact
European organizations using affected Tenda router models face risks including unauthorized administrative access to network routers, leading to potential interception or manipulation of internal and external network traffic. This could compromise confidentiality and integrity of sensitive communications and data. Attackers gaining control over routers can redirect traffic, deploy malware, or create persistent access points within corporate or governmental networks. Small and medium enterprises or home offices relying on these routers may be particularly vulnerable due to limited network segmentation or monitoring. Critical infrastructure entities using these devices could experience disruptions or espionage activities. The lack of encryption on the administrative interface exacerbates the risk, especially in environments with untrusted or public network segments. Overall, the vulnerability threatens network security posture and could facilitate broader attacks if exploited.
Mitigation Recommendations
1. Immediately restrict access to the router's administrative interface by limiting it to trusted internal networks or specific management VLANs. 2. Disable remote administration over HTTP or the internet if enabled. 3. Enforce use of HTTPS for the router's web interface to protect cookie transmission; if not supported, consider deploying a VPN or secure management channel. 4. Monitor network traffic for unusual activity indicative of session hijacking or unauthorized access attempts. 5. Apply firmware updates from Tenda as soon as they are released addressing this vulnerability. 6. If firmware patches are unavailable, consider replacing affected devices with models that implement secure cookie attributes and encrypted management interfaces. 7. Educate users and administrators about the risks of using default or insecure router configurations. 8. Implement network segmentation to isolate critical systems from potentially compromised routers. 9. Use endpoint security solutions to detect lateral movement or unusual network behavior stemming from compromised routers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2026-22081: CWE-1004 - Sensitive Cookie Without HttpOnly Flag in Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router
Description
This vulnerability exists in Tenda wireless routers (300Mbps Wireless Router F3 and N300 Easy Setup Router) due to the missing HTTPOnly flag for session cookies associated with the web-based administrative interface. A remote at-tacker could exploit this vulnerability by capturing session cookies transmitted over an insecure HTTP connection. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and gain unau-thorized access to the targeted device.
AI-Powered Analysis
Technical Analysis
CVE-2026-22081 is a vulnerability classified under CWE-1004 (Sensitive Cookie Without HttpOnly Flag) affecting Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router models. The root cause is the absence of the HttpOnly attribute on session cookies used by the routers' web-based administrative interfaces. Without the HttpOnly flag, these cookies are accessible to client-side scripts, increasing the risk of session hijacking via cross-site scripting (XSS) or network interception. Additionally, the administrative interface transmits these cookies over unencrypted HTTP connections, enabling remote attackers to capture session cookies through network sniffing or man-in-the-middle attacks. Successful exploitation allows attackers to impersonate legitimate administrators, gaining unauthorized control over router settings, potentially leading to network compromise, traffic interception, or persistent backdoors. The vulnerability affects several firmware versions of the F3 model (v3.0) and one version of the F4 model (v4.0). The CVSS 4.0 base score is 8.8, reflecting high severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality. Although no public exploits are reported yet, the vulnerability's nature makes it a significant risk, especially in environments where these routers are deployed without additional network protections.
Potential Impact
European organizations using affected Tenda router models face risks including unauthorized administrative access to network routers, leading to potential interception or manipulation of internal and external network traffic. This could compromise confidentiality and integrity of sensitive communications and data. Attackers gaining control over routers can redirect traffic, deploy malware, or create persistent access points within corporate or governmental networks. Small and medium enterprises or home offices relying on these routers may be particularly vulnerable due to limited network segmentation or monitoring. Critical infrastructure entities using these devices could experience disruptions or espionage activities. The lack of encryption on the administrative interface exacerbates the risk, especially in environments with untrusted or public network segments. Overall, the vulnerability threatens network security posture and could facilitate broader attacks if exploited.
Mitigation Recommendations
1. Immediately restrict access to the router's administrative interface by limiting it to trusted internal networks or specific management VLANs. 2. Disable remote administration over HTTP or the internet if enabled. 3. Enforce use of HTTPS for the router's web interface to protect cookie transmission; if not supported, consider deploying a VPN or secure management channel. 4. Monitor network traffic for unusual activity indicative of session hijacking or unauthorized access attempts. 5. Apply firmware updates from Tenda as soon as they are released addressing this vulnerability. 6. If firmware patches are unavailable, consider replacing affected devices with models that implement secure cookie attributes and encrypted management interfaces. 7. Educate users and administrators about the risks of using default or insecure router configurations. 8. Implement network segmentation to isolate critical systems from potentially compromised routers. 9. Use endpoint security solutions to detect lateral movement or unusual network behavior stemming from compromised routers.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-In
- Date Reserved
- 2026-01-06T07:52:50.901Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6960e8e4a48af7d8cea187dc
Added to database: 1/9/2026, 11:39:16 AM
Last enriched: 1/9/2026, 11:53:27 AM
Last updated: 2/22/2026, 9:24:13 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2938: Improper Access Controls in SourceCodester Student Result Management System
MediumCVE-2026-2385: CWE-345 Insufficient Verification of Data Authenticity in posimyththemes The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce
MediumCVE-2026-2933: Cross Site Scripting in YiFang CMS
MediumCVE-2026-2932: Cross Site Scripting in YiFang CMS
MediumCVE-2026-2930: Stack-based Buffer Overflow in Tenda A18
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.