Home

Description

Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password in plaintext. The endpoint also omits appropriate Cache-Control directives, which can allow the response to be stored in client-side caches and recovered by other local users or processes with access to cached browser data.

PUBLISHED Reserved 2026-02-19 | Published 2026-02-23 | Updated 2026-02-23 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

CWE-525: Use of Web Browser Cache Containing Sensitive Information

Product status

Default status
unknown

Any version
affected

Credits

Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc. finder

References

www.tendacn.com/product/F3 product

www.vulncheck.com/...tial-exposure-in-configuration-download third-party-advisory

cve.org (CVE-2026-27514)

nvd.nist.gov (CVE-2026-27514)

Download JSON