CVE-2026-27512
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to execute malicious scripts within the administrative interface of the Tenda F3 router, potentially gaining control over the device. It occurs because the router's firmware does not properly handle content types, which can lead to browsers interpreting harmful content as legitimate HTML, but it requires the attacker to trick the router into sending a specially crafted response.
Technical Description
Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a content-type confusion vulnerability in the administrative interface. Responses omit the X-Content-Type-Options: nosniff header and include attacker-influenced content that can be reflected into the response body. Under affected browser behaviors, MIME sniffing may cause the response to be interpreted as active HTML, enabling script execution in the context of the administrative interface.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 23, 2026
about 1 month ago
Vendor
tenda
Product
f3 firmware
Related Vulnerabilities
An attacker can remotely exploit a vulnerability in Tenda FH1202 routers to execute arbitrary code by sending specially crafted data to a specific function, which can lead to a crash or unauthorized control of the device. This attack requires no physical access and can be carried out over the internet, making it a significant risk for users with this firmware version.
This vulnerability allows an attacker to remotely take control of the Tenda FH1202 router by exploiting a flaw in its DHCP client list function, which can lead to a crash or unauthorized access to the device. The attacker needs to send specially crafted data to the router, making it possible for them to execute harmful code on the device.
An attacker can remotely exploit a flaw in the Tenda FH1202 router's firmware to execute arbitrary code by manipulating a specific setting, potentially taking control of the device. This vulnerability requires no special access, making it easy for attackers to target affected routers over the internet.
This vulnerability allows an attacker to remotely execute malicious code on the Tenda FH1202 router by exploiting a flaw in how the device handles certain input data. The attacker needs to manipulate a specific argument in the router's web interface, which could lead to unauthorized access or control of the device.
An attacker can remotely exploit a vulnerability in the Tenda FH1202 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow, potentially taking control of the device. This attack can happen without needing physical access, making it a serious risk for users of this router firmware version.