CVE-2026-24427: CWE-201 Insertion of Sensitive Information Into Sent Data in Shenzhen Tenda Technology Co., Ltd. Tenda AC7
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose sensitive information in web management responses. Administrative credentials, including the router and/or admin panel password, are included in plaintext within configuration response bodies. In addition, responses lack appropriate Cache-Control directives, which may permit web browsers to cache pages containing these credentials and enable subsequent disclosure to an attacker with access to the client system or browser profile.
AI Analysis
Technical Summary
CVE-2026-24427 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting Shenzhen Tenda AC7 routers with firmware version V03.03.03.01_cn and prior. The issue arises because the router's web management interface includes administrative credentials, such as the router or admin panel password, in plaintext within the configuration response bodies. This exposure occurs during normal web management operations, meaning that anyone able to intercept or access these responses can retrieve sensitive credentials. Furthermore, the HTTP responses lack appropriate Cache-Control directives, which would normally prevent sensitive pages from being stored in the browser cache. Without these headers, browsers may cache pages containing plaintext credentials, increasing the risk that an attacker with access to the client device or browser profile can extract these credentials later. The vulnerability requires local access (AV:L - Attack Vector: Local) and low privileges (PR:L - Privileges Required: Low), but does not require user interaction (UI:N). The attack complexity is low (AC:L), and the vulnerability impacts confidentiality highly (VC:H), while integrity and availability are not affected. The absence of authentication requirements for exploitation is not indicated, but the need for local access suggests some level of prior access or compromise is necessary. No patches or known exploits are currently available, and the vulnerability was published on February 3, 2026. The CVSS 4.0 base score is 6.8, indicating medium severity. This vulnerability can lead to unauthorized administrative access to the router, enabling attackers to manipulate network configurations, intercept traffic, or launch further attacks within the network.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and data confidentiality. If exploited, attackers can gain administrative access to the Tenda AC7 routers, potentially allowing them to alter network settings, redirect traffic, or deploy malicious configurations such as DNS hijacking or man-in-the-middle attacks. The exposure of plaintext credentials in cached browser data also increases the risk of credential theft from shared or less secure client devices. Organizations relying on Tenda AC7 routers in office environments or remote sites may face increased risks of internal network compromise. This is particularly concerning for sectors handling sensitive data, such as finance, healthcare, and government. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with shared workstations or insufficient endpoint security. The lack of patches means organizations must rely on mitigating controls until firmware updates are released. The vulnerability could also impact supply chain security if these routers are used in managed service provider environments or critical infrastructure.
Mitigation Recommendations
European organizations should immediately audit their network environments to identify the presence of Shenzhen Tenda AC7 routers running vulnerable firmware versions. Until a firmware update is available, organizations should restrict physical and network access to these devices, ensuring only trusted personnel can access the router management interface. Implement network segmentation to isolate management interfaces from general user networks and enforce strong endpoint security policies to prevent unauthorized access to client devices where cached credentials might be stored. Disable or limit web management access over insecure networks and consider using VPNs or secure tunnels for remote management. Clear browser caches regularly and configure browsers to avoid caching sensitive pages if possible. Monitor network traffic for unusual administrative access patterns and consider replacing vulnerable devices with models from vendors with more robust security practices. Finally, maintain vigilance for firmware updates from Shenzhen Tenda Technology Co., Ltd. and apply patches promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2026-24427: CWE-201 Insertion of Sensitive Information Into Sent Data in Shenzhen Tenda Technology Co., Ltd. Tenda AC7
Description
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose sensitive information in web management responses. Administrative credentials, including the router and/or admin panel password, are included in plaintext within configuration response bodies. In addition, responses lack appropriate Cache-Control directives, which may permit web browsers to cache pages containing these credentials and enable subsequent disclosure to an attacker with access to the client system or browser profile.
AI-Powered Analysis
Technical Analysis
CVE-2026-24427 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting Shenzhen Tenda AC7 routers with firmware version V03.03.03.01_cn and prior. The issue arises because the router's web management interface includes administrative credentials, such as the router or admin panel password, in plaintext within the configuration response bodies. This exposure occurs during normal web management operations, meaning that anyone able to intercept or access these responses can retrieve sensitive credentials. Furthermore, the HTTP responses lack appropriate Cache-Control directives, which would normally prevent sensitive pages from being stored in the browser cache. Without these headers, browsers may cache pages containing plaintext credentials, increasing the risk that an attacker with access to the client device or browser profile can extract these credentials later. The vulnerability requires local access (AV:L - Attack Vector: Local) and low privileges (PR:L - Privileges Required: Low), but does not require user interaction (UI:N). The attack complexity is low (AC:L), and the vulnerability impacts confidentiality highly (VC:H), while integrity and availability are not affected. The absence of authentication requirements for exploitation is not indicated, but the need for local access suggests some level of prior access or compromise is necessary. No patches or known exploits are currently available, and the vulnerability was published on February 3, 2026. The CVSS 4.0 base score is 6.8, indicating medium severity. This vulnerability can lead to unauthorized administrative access to the router, enabling attackers to manipulate network configurations, intercept traffic, or launch further attacks within the network.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and data confidentiality. If exploited, attackers can gain administrative access to the Tenda AC7 routers, potentially allowing them to alter network settings, redirect traffic, or deploy malicious configurations such as DNS hijacking or man-in-the-middle attacks. The exposure of plaintext credentials in cached browser data also increases the risk of credential theft from shared or less secure client devices. Organizations relying on Tenda AC7 routers in office environments or remote sites may face increased risks of internal network compromise. This is particularly concerning for sectors handling sensitive data, such as finance, healthcare, and government. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with shared workstations or insufficient endpoint security. The lack of patches means organizations must rely on mitigating controls until firmware updates are released. The vulnerability could also impact supply chain security if these routers are used in managed service provider environments or critical infrastructure.
Mitigation Recommendations
European organizations should immediately audit their network environments to identify the presence of Shenzhen Tenda AC7 routers running vulnerable firmware versions. Until a firmware update is available, organizations should restrict physical and network access to these devices, ensuring only trusted personnel can access the router management interface. Implement network segmentation to isolate management interfaces from general user networks and enforce strong endpoint security policies to prevent unauthorized access to client devices where cached credentials might be stored. Disable or limit web management access over insecure networks and consider using VPNs or secure tunnels for remote management. Clear browser caches regularly and configure browsers to avoid caching sensitive pages if possible. Monitor network traffic for unusual administrative access patterns and consider replacing vulnerable devices with models from vendors with more robust security practices. Finally, maintain vigilance for firmware updates from Shenzhen Tenda Technology Co., Ltd. and apply patches promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-22T20:23:19.802Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6982493ef9fa50a62fdabb15
Added to database: 2/3/2026, 7:15:10 PM
Last enriched: 2/3/2026, 7:31:37 PM
Last updated: 2/6/2026, 2:33:22 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2056: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.