Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24430: CWE-201 Insertion of Sensitive Information Into Sent Data in Shenzhen Tenda Technology Co., Ltd. W30E V2

0
High
VulnerabilityCVE-2026-24430cvecve-2026-24430cwe-201
Published: Mon Jan 26 2026 (01/26/2026, 17:39:14 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: W30E V2

Description

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be exposed to network-based interception.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:18:42 UTC

Technical Analysis

CVE-2026-24430 is a vulnerability identified in the Shenzhen Tenda Technology Co., Ltd. W30E V2 router firmware versions up to and including V16.01.0.19(5037). The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, the router's maintenance interface responds to HTTP requests with sensitive account credentials embedded in cleartext within the HTTP response bodies. This exposure occurs because the management interface is accessible over unencrypted HTTP by default, lacking encryption such as HTTPS. Consequently, any attacker with network access—such as on the same local network or via compromised network segments—can intercept these HTTP responses and extract administrative credentials without requiring authentication or user interaction. The CVSS 4.0 base score is 8.2 (high severity), reflecting network attack vector, high attack complexity, no privileges or user interaction required, and high confidentiality impact. The vulnerability does not affect integrity or availability directly but compromises confidentiality of sensitive credentials. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability enables attackers to gain unauthorized administrative access to the router, potentially allowing them to alter configurations, intercept or redirect traffic, or launch further attacks within the network.

Potential Impact

The primary impact of CVE-2026-24430 is the exposure of administrative credentials in plaintext over an unencrypted management interface. This can lead to unauthorized access to the router's management console, allowing attackers to change device configurations, disable security features, or redirect network traffic. For organizations, this can result in network compromise, data interception, and lateral movement within internal networks. The vulnerability is particularly dangerous in environments where the router management interface is accessible beyond trusted internal networks or where network segmentation is weak. Since exploitation requires network access but no authentication, attackers who gain local network access—via Wi-Fi, compromised devices, or insider threats—can leverage this vulnerability. The lack of encryption in the management interface also increases the risk in environments using public or shared networks. The overall impact includes loss of confidentiality, potential integrity violations through configuration changes, and indirect availability impacts if the attacker disrupts network services. Given the widespread use of Tenda routers in residential, small business, and some enterprise contexts, the vulnerability poses a significant risk to a broad range of organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2026-24430, organizations should implement the following specific measures: 1) Immediately restrict access to the router's management interface by limiting it to trusted, isolated network segments or via VPNs to prevent unauthorized network access. 2) Disable remote management over HTTP if enabled, or configure it to use HTTPS with strong encryption to prevent credential interception. 3) Monitor network traffic for unauthorized access attempts or unusual HTTP requests targeting the router's maintenance interface. 4) Change default administrative credentials to strong, unique passwords to reduce risk if credentials are exposed. 5) Regularly check for and apply firmware updates from Shenzhen Tenda that address this vulnerability once available. 6) Employ network segmentation and strong Wi-Fi security controls to limit attacker access to the local network. 7) Consider replacing affected devices with models that enforce secure management interfaces by default. These steps go beyond generic advice by focusing on access control, encryption enforcement, and proactive monitoring tailored to this vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.802Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977a98b4623b1157caf782d

Added to database: 1/26/2026, 5:51:07 PM

Last enriched: 3/5/2026, 9:18:42 AM

Last updated: 3/24/2026, 3:57:58 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses