Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31846: CWE-306 Missing Authentication for Critical Function in Nexxt Solutions Nebula 300+ / Tenda F3 V2.0 Firmware

0
High
VulnerabilityCVE-2026-31846cvecve-2026-31846cwe-306
Published: Mon Mar 23 2026 (03/23/2026, 12:00:42 UTC)
Source: CVE Database V5
Vendor/Project: Nexxt Solutions
Product: Nebula 300+ / Tenda F3 V2.0 Firmware

Description

Missing authentication in the /goform/ate endpoint in Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 allows an adjacent unauthenticated attacker to retrieve sensitive device information, including the administrator password. The endpoint returns a raw response containing parameters such as Login_PW, which is Base64-encoded. An attacker can decode this value to obtain valid administrative credentials and authenticate to the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:10:41 UTC

Technical Analysis

CVE-2026-31846 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Nexxt Solutions Nebula 300+ and Tenda F3 V2.0 routers running firmware versions up to 12.01.01.37. The flaw resides in the /goform/ate HTTP endpoint, which lacks any authentication controls, allowing an attacker on the same local network or adjacent network segment to send requests and receive sensitive device information. The response includes parameters such as Login_PW, which contains the administrator password encoded in Base64. Since Base64 encoding is reversible, an attacker can easily decode this value to obtain valid administrative credentials. With these credentials, the attacker can fully authenticate to the device’s management interface, enabling them to change configurations, intercept traffic, or launch further attacks. The vulnerability requires no privileges, no user interaction, and has a low attack complexity, but does require network adjacency, limiting remote exploitation. The CVSS 4.0 score of 7.1 reflects the high confidentiality impact and ease of exploitation within the local network. No patches or official fixes are currently linked, and no exploits have been reported in the wild, but the risk remains significant due to the sensitive nature of the exposed credentials.

Potential Impact

The primary impact of this vulnerability is the compromise of device confidentiality and integrity. An attacker gaining administrative credentials can fully control the router, potentially intercepting or redirecting network traffic, disabling security features, or deploying persistent malware. This can lead to data breaches, network downtime, and lateral movement within organizational networks. Small offices and home users relying on these devices are particularly vulnerable, as they may lack additional network segmentation or monitoring. The absence of authentication on a critical endpoint exposes the device to easy credential theft, increasing the risk of widespread compromise if exploited in environments with many such devices. Although remote exploitation is limited by the adjacency requirement, attackers who gain local network access—via Wi-Fi or compromised devices—can leverage this flaw to escalate privileges and control the network gateway.

Mitigation Recommendations

Organizations and users should immediately verify their device firmware version and upgrade to a version beyond 12.01.01.37 once available from Nexxt Solutions or Tenda. Until patches are released, network administrators should restrict access to the device management interface by implementing strict network segmentation, such as isolating router management interfaces on separate VLANs accessible only to trusted administrators. Disabling remote management features and restricting Wi-Fi access to trusted users can reduce the risk of local network attackers. Monitoring network traffic for unusual requests to the /goform/ate endpoint may help detect exploitation attempts. Additionally, changing default passwords and using strong, unique credentials can limit the impact if credentials are exposed. Vendors should be urged to release firmware updates promptly and provide clear guidance to users. Employing network intrusion detection systems (NIDS) that can identify suspicious local network scanning or credential extraction attempts can further enhance defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TuranSec
Date Reserved
2026-03-09T18:20:23.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c12ef9f4197a8e3b4f4049

Added to database: 3/23/2026, 12:15:53 PM

Last enriched: 3/30/2026, 8:10:41 PM

Last updated: 5/7/2026, 4:19:41 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses