Untriaged
Permalink
CVE-2026-2181
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Activity log
- Created suggestion
Tenda RX3 openSchedWifi stack-based overflow
A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
References
-
-
-
Submit #749710 | Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow third-party-advisory
-
-
https://www.tenda.com.cn/ product
Affected products
RX3
- ==16.03.13.11
Matching in nixpkgs
pkgs.go-crx3
Chrome browser extension tools
-
nixos-unstable crx3-1.6.0
- nixpkgs-unstable crx3-1.6.0
- nixos-unstable-small crx3-1.6.0
-
nixos-25.11 crx3-1.6.0
- nixpkgs-25.11-darwin crx3-1.6.0
Package maintainers
-
@Defelo Defelo