CVE-2026-27514

Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password in plaintext. The endpoint also omits appropriate Cache-Control directives, which can allow the response to be stored in client-side caches and recovered by other local users or processes with access to cached browser data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:f3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:f3:-:*:*:*:*:*:*:*

History

23 Feb 2026, 20:11

Type Values Removed Values Added
First Time Tenda
Tenda f3
Tenda f3 Firmware
CPE cpe:2.3:h:tenda:f3:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:f3_firmware:*:*:*:*:*:*:*:*
References () https://www.tendacn.com/product/F3 - () https://www.tendacn.com/product/F3 - Product
References () https://www.vulncheck.com/advisories/tenda-f3-plaintext-credential-exposure-in-configuration-download - () https://www.vulncheck.com/advisories/tenda-f3-plaintext-credential-exposure-in-configuration-download - Third Party Advisory

23 Feb 2026, 17:23

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-23 17:23

Updated : 2026-02-23 20:11


NVD link : CVE-2026-27514

Mitre link : CVE-2026-27514

CVE.ORG link : CVE-2026-27514


JSON object : View

Products Affected

tenda

  • f3
  • f3_firmware
CWE
CWE-201

Insertion of Sensitive Information Into Sent Data

CWE-525

Use of Web Browser Cache Containing Sensitive Information