Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24432: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. W30E V2

0
Medium
VulnerabilityCVE-2026-24432cvecve-2026-24432cwe-352
Published: Mon Jan 26 2026 (01/26/2026, 17:46:54 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: W30E V2

Description

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) lack cross-site request forgery (CSRF) protections on administrative endpoints, including those used to change administrator account credentials. As a result, an attacker can craft malicious requests that, when triggered by an authenticated user’s browser, modify administrative passwords and other configuration settings.

AI-Powered Analysis

AILast updated: 01/26/2026, 18:20:56 UTC

Technical Analysis

CVE-2026-24432 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Shenzhen Tenda W30E V2 router firmware versions up to and including V16.01.0.19(5037). The root cause is the absence of CSRF protections on administrative HTTP endpoints, which are responsible for critical functions such as changing administrator account credentials. CSRF vulnerabilities allow attackers to craft malicious web requests that, when executed by an authenticated user's browser, perform unauthorized actions on the device without the user's consent. In this case, an attacker can exploit the vulnerability by luring an authenticated administrator to visit a malicious webpage, which then silently sends crafted requests to the router to modify admin passwords or alter configuration settings. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality and integrity is significant because unauthorized changes to admin credentials can lead to full device compromise. Availability impact is limited but possible if configurations are altered to disrupt network operations. No authentication or special privileges are needed to exploit this, but the attacker must convince a logged-in administrator to visit a malicious site. There are currently no known exploits in the wild, and no official patches have been published yet. This vulnerability highlights the importance of implementing CSRF tokens or other anti-CSRF mechanisms on all sensitive administrative endpoints in network devices.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure security. If exploited, attackers can gain unauthorized administrative control over affected Tenda W30E V2 routers, potentially leading to interception or redirection of network traffic, disruption of network services, or persistent backdoor access. This could compromise confidentiality by exposing sensitive communications, integrity by altering configurations or credentials, and availability if network disruptions occur. Organizations relying on these routers in critical environments such as corporate offices, small and medium enterprises, or public institutions may face operational disruptions and data breaches. The requirement for user interaction (an authenticated admin visiting a malicious webpage) somewhat limits the attack scope but does not eliminate risk, especially in environments with less stringent user security awareness. The absence of known exploits in the wild provides a window for proactive mitigation. However, the lack of patches means organizations must rely on compensating controls until firmware updates are available. The impact is more pronounced in sectors with high security requirements or where these devices are used as edge routers or in remote offices.

Mitigation Recommendations

1. Immediately restrict administrative access to the Tenda W30E V2 routers to trusted networks only, preferably via VPN or secure management VLANs, to reduce exposure to malicious web requests. 2. Educate administrators and users about the risks of visiting untrusted websites while logged into router management interfaces to minimize the chance of CSRF exploitation. 3. Implement network-level protections such as web filtering and DNS filtering to block access to known malicious domains that could host CSRF attack pages. 4. Monitor router logs and configurations regularly for unauthorized changes, especially to administrator credentials and critical settings. 5. If possible, disable remote administration features on these devices until a firmware update addressing the vulnerability is released. 6. Engage with Shenzhen Tenda support channels to obtain information on planned patches or firmware updates and apply them promptly once available. 7. Consider replacing affected devices with models that have robust security controls and CSRF protections if patching is not feasible in the short term. 8. Employ multi-factor authentication (MFA) for router administration if supported, adding an additional layer of defense against credential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.803Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977ad0e4623b1157cb1317c

Added to database: 1/26/2026, 6:06:06 PM

Last enriched: 1/26/2026, 6:20:56 PM

Last updated: 1/26/2026, 8:11:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats