CVE-2026-27513: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. Tenda F3
Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a cross-site request forgery (CSRF) vulnerability in the web-based administrative interface. The interface does not implement anti-CSRF protections, allowing an attacker to induce an authenticated administrator to submit state-changing requests, which can result in unauthorized configuration changes.
AI Analysis
Technical Summary
CVE-2026-27513 identifies a cross-site request forgery (CSRF) vulnerability in the Shenzhen Tenda F3 wireless router firmware version V12.01.01.55_multi. The vulnerability arises because the router's web-based administrative interface does not implement anti-CSRF tokens or other protections to verify the legitimacy of state-changing requests. As a result, an attacker can craft malicious web content that, when visited by an authenticated administrator, causes the administrator's browser to unknowingly submit unauthorized requests to the router. These requests can alter critical router configurations such as network settings, firewall rules, or DNS configurations, potentially undermining network security. The vulnerability does not require the attacker to have prior authentication or privileges on the router but does require the administrator to be logged in and to interact with the attacker's content (user interaction). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:A), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. No patches or exploits are currently documented, but the lack of anti-CSRF protections is a common and well-understood security weakness that can be exploited with relative ease in targeted scenarios.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of router configurations, which can have cascading effects on network security and stability. Attackers could redirect traffic, disable security features, open backdoors, or disrupt network availability by changing firewall or routing settings. For organizations, this could lead to data interception, man-in-the-middle attacks, or network outages. Since the router is often the gateway device, compromise here can affect all connected devices, amplifying the risk. The requirement for an authenticated administrator to interact with malicious content limits the scope somewhat but does not eliminate risk, especially in environments where administrators may access untrusted websites or emails. The vulnerability could be leveraged in targeted attacks against enterprises, small businesses, or home users relying on this router model. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately restrict administrative access to the router interface to trusted networks and users, ideally via VPN or secure management VLANs. 2) Educate administrators to avoid visiting untrusted websites or clicking suspicious links while logged into the router's admin interface. 3) Implement network-level protections such as web filtering and intrusion prevention systems to block known malicious sites and CSRF attack vectors. 4) Monitor router configuration changes and logs for unauthorized modifications. 5) Contact Shenzhen Tenda Technology for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6) If firmware updates are unavailable, consider replacing affected devices with models that implement proper anti-CSRF protections. 7) Employ multi-factor authentication for router administration if supported to reduce risk from compromised credentials. These steps go beyond generic advice by focusing on access control, user behavior, monitoring, and vendor engagement specific to this router model and vulnerability.
Affected Countries
China, United States, India, Brazil, Russia, Germany, United Kingdom, France, Japan, South Korea
CVE-2026-27513: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. Tenda F3
Description
Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a cross-site request forgery (CSRF) vulnerability in the web-based administrative interface. The interface does not implement anti-CSRF protections, allowing an attacker to induce an authenticated administrator to submit state-changing requests, which can result in unauthorized configuration changes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27513 identifies a cross-site request forgery (CSRF) vulnerability in the Shenzhen Tenda F3 wireless router firmware version V12.01.01.55_multi. The vulnerability arises because the router's web-based administrative interface does not implement anti-CSRF tokens or other protections to verify the legitimacy of state-changing requests. As a result, an attacker can craft malicious web content that, when visited by an authenticated administrator, causes the administrator's browser to unknowingly submit unauthorized requests to the router. These requests can alter critical router configurations such as network settings, firewall rules, or DNS configurations, potentially undermining network security. The vulnerability does not require the attacker to have prior authentication or privileges on the router but does require the administrator to be logged in and to interact with the attacker's content (user interaction). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:A), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. No patches or exploits are currently documented, but the lack of anti-CSRF protections is a common and well-understood security weakness that can be exploited with relative ease in targeted scenarios.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of router configurations, which can have cascading effects on network security and stability. Attackers could redirect traffic, disable security features, open backdoors, or disrupt network availability by changing firewall or routing settings. For organizations, this could lead to data interception, man-in-the-middle attacks, or network outages. Since the router is often the gateway device, compromise here can affect all connected devices, amplifying the risk. The requirement for an authenticated administrator to interact with malicious content limits the scope somewhat but does not eliminate risk, especially in environments where administrators may access untrusted websites or emails. The vulnerability could be leveraged in targeted attacks against enterprises, small businesses, or home users relying on this router model. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately restrict administrative access to the router interface to trusted networks and users, ideally via VPN or secure management VLANs. 2) Educate administrators to avoid visiting untrusted websites or clicking suspicious links while logged into the router's admin interface. 3) Implement network-level protections such as web filtering and intrusion prevention systems to block known malicious sites and CSRF attack vectors. 4) Monitor router configuration changes and logs for unauthorized modifications. 5) Contact Shenzhen Tenda Technology for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6) If firmware updates are unavailable, consider replacing affected devices with models that implement proper anti-CSRF protections. 7) Employ multi-factor authentication for router administration if supported to reduce risk from compromised credentials. These steps go beyond generic advice by focusing on access control, user behavior, monitoring, and vendor engagement specific to this router model and vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-19T19:51:07.328Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699c852abe58cf853ba98533
Added to database: 2/23/2026, 4:49:46 PM
Last enriched: 3/10/2026, 5:16:16 PM
Last updated: 4/10/2026, 6:11:41 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.