Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31846: CWE-306 Missing Authentication for Critical Function in Nexxt Solutions Nebula 300+ / Tenda F3 V2.0 Firmware

0
High
VulnerabilityCVE-2026-31846cvecve-2026-31846cwe-306
Published: Mon Mar 23 2026 (03/23/2026, 12:00:42 UTC)
Source: CVE Database V5
Vendor/Project: Nexxt Solutions
Product: Nebula 300+ / Tenda F3 V2.0 Firmware

Description

CVE-2026-31846 is a high-severity vulnerability in Nexxt Solutions Nebula 300+ and Tenda F3 V2. 0 firmware (versions up to 12. 01. 01. 37). It involves missing authentication on the /goform/ate endpoint, allowing an adjacent attacker to retrieve the administrator password encoded in Base64 via a crafted HTTP request. This credential disclosure enables unauthorized access to the device, potentially leading to further compromise. The vulnerability requires network adjacency but no authentication or user interaction, and it affects device confidentiality critically. No public exploits are currently known. Organizations using these devices should prioritize firmware updates once available and restrict network access to management interfaces.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 12:30:50 UTC

Technical Analysis

CVE-2026-31846 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Nexxt Solutions Nebula 300+ and Tenda F3 V2.0 routers running firmware versions up to 12.01.01.37. The flaw exists in the /goform/ate HTTP endpoint, which lacks proper authentication controls, allowing an attacker with network adjacency to send a crafted HTTP request and retrieve the administrator password in Base64-encoded form. This password disclosure is critical because it grants unauthorized access to the device's administrative functions, enabling attackers to manipulate device settings, intercept or redirect network traffic, or deploy further attacks. The vulnerability does not require any privileges or user interaction, making it easier to exploit within the local network or adjacent network segments. The CVSS v4.0 score of 7.1 reflects high severity, primarily due to the ease of exploitation and the critical impact on confidentiality. Although no public exploits have been reported, the presence of this vulnerability in widely deployed consumer and small business routers poses a significant security risk. The lack of available patches at the time of disclosure further exacerbates the threat, emphasizing the need for immediate mitigation strategies.

Potential Impact

The primary impact of CVE-2026-31846 is the unauthorized disclosure of administrator credentials, which compromises the confidentiality and integrity of affected devices. Attackers gaining administrative access can alter device configurations, disable security features, create persistent backdoors, or intercept sensitive network traffic. This can lead to broader network compromise, data breaches, and disruption of services reliant on these routers. Organizations using these devices in critical infrastructure, small to medium enterprises, or home networks face increased risk of lateral movement by attackers. The vulnerability's exploitation could facilitate advanced persistent threats or ransomware campaigns by providing initial footholds. Since the flaw requires network adjacency, environments with segmented or restricted management networks may reduce exposure, but flat or poorly segmented networks are highly vulnerable. The absence of authentication on a critical function undermines trust in device security and may lead to reputational damage for affected vendors and users.

Mitigation Recommendations

1. Immediately restrict access to the management interfaces of Nexxt Solutions Nebula 300+ and Tenda F3 V2.0 devices to trusted network segments only, using VLANs, firewall rules, or access control lists to limit adjacency exposure. 2. Monitor network traffic for suspicious HTTP requests targeting the /goform/ate endpoint and implement intrusion detection/prevention systems (IDS/IPS) signatures to detect exploitation attempts. 3. Change default and existing administrator passwords regularly and ensure strong, unique credentials are used to reduce the risk if credentials are disclosed. 4. Disable remote management features if not required, especially those accessible from untrusted networks. 5. Engage with the vendor for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. Consider deploying network segmentation and zero-trust principles to isolate critical devices and reduce the attack surface. 7. Conduct regular security audits and vulnerability assessments on network devices to identify and remediate similar issues proactively. 8. Educate network administrators about this vulnerability to ensure awareness and prompt response to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TuranSec
Date Reserved
2026-03-09T18:20:23.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c12ef9f4197a8e3b4f4049

Added to database: 3/23/2026, 12:15:53 PM

Last enriched: 3/23/2026, 12:30:50 PM

Last updated: 3/23/2026, 2:33:22 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses