CVE-2026-2187

A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
References
Link Resource
https://github.com/LX-66-LX/cve-new/issues/8 Exploit Issue Tracking
https://vuldb.com/?ctiid.344890 Permissions Required VDB Entry
https://vuldb.com/?id.344890 Third Party Advisory VDB Entry
https://vuldb.com/?submit.749721 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11:*:*:*:*:*:*:*
cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*

History

10 Feb 2026, 14:54

Type Values Removed Values Added
CPE cpe:2.3:h:tenda:rx3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx3_firmware:16.03.13.11:*:*:*:*:*:*:*
References () https://github.com/LX-66-LX/cve-new/issues/8 - () https://github.com/LX-66-LX/cve-new/issues/8 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.344890 - () https://vuldb.com/?ctiid.344890 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.344890 - () https://vuldb.com/?id.344890 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.749721 - () https://vuldb.com/?submit.749721 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
First Time Tenda
Tenda rx3 Firmware
Tenda rx3

08 Feb 2026, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-08 21:15

Updated : 2026-02-10 14:54


NVD link : CVE-2026-2187

Mitre link : CVE-2026-2187

CVE.ORG link : CVE-2026-2187


JSON object : View

Products Affected

tenda

  • rx3_firmware
  • rx3
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow