Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24427: CWE-201 Insertion of Sensitive Information Into Sent Data in Shenzhen Tenda Technology Co., Ltd. Tenda AC7

0
Medium
VulnerabilityCVE-2026-24427cvecve-2026-24427cwe-201
Published: Tue Feb 03 2026 (02/03/2026, 19:11:32 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: Tenda AC7

Description

Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose sensitive information in web management responses. Administrative credentials, including the router and/or admin panel password, are included in plaintext within configuration response bodies. In addition, responses lack appropriate Cache-Control directives, which may permit web browsers to cache pages containing these credentials and enable subsequent disclosure to an attacker with access to the client system or browser profile.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:31:37 UTC

Technical Analysis

CVE-2026-24427 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting Shenzhen Tenda AC7 routers with firmware version V03.03.03.01_cn and prior. The issue arises because the router's web management interface includes administrative credentials, such as the router or admin panel password, in plaintext within the configuration response bodies. This exposure occurs during normal web management operations, meaning that anyone able to intercept or access these responses can retrieve sensitive credentials. Furthermore, the HTTP responses lack appropriate Cache-Control directives, which would normally prevent sensitive pages from being stored in the browser cache. Without these headers, browsers may cache pages containing plaintext credentials, increasing the risk that an attacker with access to the client device or browser profile can extract these credentials later. The vulnerability requires local access (AV:L - Attack Vector: Local) and low privileges (PR:L - Privileges Required: Low), but does not require user interaction (UI:N). The attack complexity is low (AC:L), and the vulnerability impacts confidentiality highly (VC:H), while integrity and availability are not affected. The absence of authentication requirements for exploitation is not indicated, but the need for local access suggests some level of prior access or compromise is necessary. No patches or known exploits are currently available, and the vulnerability was published on February 3, 2026. The CVSS 4.0 base score is 6.8, indicating medium severity. This vulnerability can lead to unauthorized administrative access to the router, enabling attackers to manipulate network configurations, intercept traffic, or launch further attacks within the network.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and data confidentiality. If exploited, attackers can gain administrative access to the Tenda AC7 routers, potentially allowing them to alter network settings, redirect traffic, or deploy malicious configurations such as DNS hijacking or man-in-the-middle attacks. The exposure of plaintext credentials in cached browser data also increases the risk of credential theft from shared or less secure client devices. Organizations relying on Tenda AC7 routers in office environments or remote sites may face increased risks of internal network compromise. This is particularly concerning for sectors handling sensitive data, such as finance, healthcare, and government. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with shared workstations or insufficient endpoint security. The lack of patches means organizations must rely on mitigating controls until firmware updates are released. The vulnerability could also impact supply chain security if these routers are used in managed service provider environments or critical infrastructure.

Mitigation Recommendations

European organizations should immediately audit their network environments to identify the presence of Shenzhen Tenda AC7 routers running vulnerable firmware versions. Until a firmware update is available, organizations should restrict physical and network access to these devices, ensuring only trusted personnel can access the router management interface. Implement network segmentation to isolate management interfaces from general user networks and enforce strong endpoint security policies to prevent unauthorized access to client devices where cached credentials might be stored. Disable or limit web management access over insecure networks and consider using VPNs or secure tunnels for remote management. Clear browser caches regularly and configure browsers to avoid caching sensitive pages if possible. Monitor network traffic for unusual administrative access patterns and consider replacing vulnerable devices with models from vendors with more robust security practices. Finally, maintain vigilance for firmware updates from Shenzhen Tenda Technology Co., Ltd. and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.802Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6982493ef9fa50a62fdabb15

Added to database: 2/3/2026, 7:15:10 PM

Last enriched: 2/3/2026, 7:31:37 PM

Last updated: 2/6/2026, 2:33:22 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats