Dismissed
Permalink
CVE-2026-2181
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @jopejoe1 Activity log
- Created automatic suggestion
- @jopejoe1 removed package go-crx3
- @jopejoe1 dismissed
Tenda RX3 openSchedWifi stack-based overflow
A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
References
- VDB-344884 | Tenda RX3 openSchedWifi stack-based overflow vdb-entry technical-description
- VDB-344884 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #749710 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
- https://github.com/LX-66-LX/cve-new/issues/5 issue-tracking exploit
- https://www.tenda.com.cn/ product
- VDB-344884 | Tenda RX3 openSchedWifi stack-based overflow vdb-entry technical-description
- VDB-344884 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #749710 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
- https://github.com/LX-66-LX/cve-new/issues/5 issue-tracking exploit
- https://www.tenda.com.cn/ product
Affected products
RX3
- ==16.03.13.11