Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24428: CWE-863 Incorrect Authorization in Shenzhen Tenda Technology Co., Ltd. W30E V2

0
High
VulnerabilityCVE-2026-24428cvecve-2026-24428cwe-863
Published: Mon Jan 26 2026 (01/26/2026, 17:39:45 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: W30E V2

Description

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:27:10 UTC

Technical Analysis

CVE-2026-24428 is an authorization bypass vulnerability classified under CWE-863, affecting Shenzhen Tenda Technology Co., Ltd.'s W30E V2 router firmware versions up to and including V16.01.0.19(5037). The vulnerability resides in the user management API, where role-based access controls enforced by the web interface can be circumvented by sending crafted requests directly to the backend endpoint. This flaw allows a low-privileged authenticated user to change the administrator account password without proper authorization, effectively escalating privileges to full administrative control. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required beyond low-level authentication (PR:L), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high, as an attacker can fully control the device, modify configurations, and potentially disrupt network operations. No public exploits are currently reported, but the vulnerability's nature suggests it could be weaponized easily once disclosed. The lack of available patches at the time of reporting necessitates immediate mitigation through network segmentation and access restrictions. This vulnerability is particularly critical for environments relying on these routers for network perimeter security or internal segmentation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office setups that commonly use consumer-grade routers like the Tenda W30E V2. Successful exploitation allows attackers to gain full administrative access to the router, enabling them to alter network configurations, intercept or redirect traffic, deploy persistent backdoors, or disrupt network availability. This can lead to data breaches, lateral movement within corporate networks, and compromise of connected devices. The impact extends to confidentiality (unauthorized data access), integrity (configuration tampering), and availability (potential denial of service). Given the widespread use of such routers in less-secured environments, the threat could facilitate broader attacks on corporate networks and critical infrastructure. Additionally, the lack of current patches increases exposure time, raising the likelihood of exploitation in the wild. European organizations with remote or hybrid workforces relying on these devices are particularly vulnerable.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface by limiting it to trusted internal networks or specific IP addresses using firewall rules. 2. Disable remote management features if not strictly necessary to reduce exposure. 3. Monitor network traffic for unusual API requests targeting the user management endpoints, which may indicate exploitation attempts. 4. Enforce strong authentication policies and consider multi-factor authentication if supported by the device. 5. Segment networks to isolate vulnerable devices from critical infrastructure and sensitive data. 6. Regularly audit and review router configurations and logs for unauthorized changes. 7. Stay alert for official firmware updates from Shenzhen Tenda and apply patches promptly once available. 8. Consider replacing affected devices with models from vendors with stronger security track records if patching is delayed or unavailable. 9. Educate users about the risks of using default or weak credentials and the importance of secure device management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.802Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977a98b4623b1157caf7825

Added to database: 1/26/2026, 5:51:07 PM

Last enriched: 2/4/2026, 8:27:10 AM

Last updated: 2/7/2026, 4:43:26 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats