Cp3 Firmware Tenda Cp3 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Tenda Cp3 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Tenda Cp3 Firmware. Last year, in 2025 Cp3 Firmware had 1 security vulnerability published. Right now, Cp3 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 8.80
2024 0 0.00
2023 5 8.88

It may take a day or so for new Cp3 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tenda Cp3 Firmware Security Vulnerabilities

Tenda CP3 11.10.00.2311090948 Remote Cmd Injection via sub_F3C8C
CVE-2025-5763 8.8 - High - June 06, 2025

A vulnerability has been found in Tenda CP3 11.10.00.2311090948 and classified as critical. Affected by this vulnerability is the function sub_F3C8C of the file apollo. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Command Injection

Shenzhen Tenda IP Camera CP3 V11.10.00.2211041355 Firmware Update Lacks Int Check
CVE-2023-30356 7.5 - High - May 10, 2023

Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware

Improper Validation of Integrity Check Value

Tenda CP3 UART U-Boot Physical Access Leak Wi-Fi Password
CVE-2023-30354 9.8 - Critical - May 10, 2023

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access.

Cleartext Transmission of Sensitive Information

Unauth RCE via XML in Shenzen Tenda Cam CP3 V11.10.00.2211041355
CVE-2023-30353 9.8 - Critical - May 10, 2023

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document.

Command Injection

Shenzhen Tenda CP3 IP Cam V11.10.00.* has hard-coded default RTSP password
CVE-2023-30352 9.8 - Critical - May 10, 2023

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for the RTSP feed.

Use of Hard-coded Credentials

Shenzhen Tenda IP Cam CP3 V11.10.00.2211041355: Hardcoded root TELNET creds
CVE-2023-30351 7.5 - High - May 10, 2023

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials.

Inadequate Encryption Strength

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Tenda Cp3 Firmware or by Tenda? Click the Watch button to subscribe.

Tenda
Vendor

subscribe