Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24432: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. W30E V2

0
Medium
VulnerabilityCVE-2026-24432cvecve-2026-24432cwe-352
Published: Mon Jan 26 2026 (01/26/2026, 17:46:54 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: W30E V2

Description

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) lack cross-site request forgery (CSRF) protections on administrative endpoints, including those used to change administrator account credentials. As a result, an attacker can craft malicious requests that, when triggered by an authenticated user’s browser, modify administrative passwords and other configuration settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:19:17 UTC

Technical Analysis

CVE-2026-24432 is a cross-site request forgery (CSRF) vulnerability identified in the firmware of Shenzhen Tenda Technology Co., Ltd.'s W30E V2 router, specifically in versions up to and including V16.01.0.19(5037). The vulnerability arises because the firmware does not implement CSRF protections on critical administrative endpoints, including those that allow modification of administrator account credentials and other configuration parameters. CSRF vulnerabilities enable attackers to craft malicious HTTP requests that, when executed by a victim's authenticated browser session, perform unauthorized actions on the device without the user's consent. In this case, an attacker can trick an authenticated user into visiting a malicious webpage or clicking a crafted link, which then silently sends requests to the router's administrative interface to change passwords or alter settings. The vulnerability does not require the attacker to have any privileges or prior authentication, but it does require the victim to be logged into the router's admin interface and to interact with the malicious content. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:A), and limited impact on confidentiality (VC:N), integrity (VI:L), and no impact on availability (VA:N). No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. This vulnerability is classified under CWE-352, which covers CSRF issues. The lack of CSRF tokens or other anti-CSRF mechanisms in the router's web interface is the root cause. Attackers exploiting this vulnerability can gain control over administrative functions, potentially leading to device takeover or network compromise.

Potential Impact

The primary impact of CVE-2026-24432 is unauthorized modification of router administrative credentials and configuration settings. This can lead to several downstream consequences for organizations: 1) Loss of administrative control over the device, enabling attackers to lock out legitimate administrators or create persistent backdoors. 2) Potential network compromise if attackers alter routing, firewall, or DNS settings, facilitating man-in-the-middle attacks, data interception, or traffic redirection. 3) Disruption of network availability or integrity if critical settings are changed maliciously. 4) Exposure of internal network resources to external attackers if security controls are weakened. Since the vulnerability requires user interaction but no authentication, it can be exploited via social engineering or drive-by attacks targeting employees or users with access to the router's admin interface. Organizations relying on Shenzhen Tenda W30E V2 routers in sensitive or critical environments face risks of unauthorized network access, data breaches, and operational disruption. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's ease of exploitation and potential severity warrant proactive mitigation.

Mitigation Recommendations

1) Firmware Update: Monitor Shenzhen Tenda's official channels for firmware updates addressing this CSRF vulnerability and apply patches promptly once available. 2) Network Segmentation: Restrict administrative interface access to trusted management networks or specific IP addresses using firewall rules to prevent exposure to untrusted networks. 3) Access Controls: Disable remote administration features if not required, or enforce strong authentication and encrypted management protocols (e.g., HTTPS, VPN) to reduce attack surface. 4) User Awareness: Educate users with administrative access about the risks of clicking unknown links or visiting untrusted websites while logged into router interfaces. 5) Web Application Firewall (WAF): Deploy WAFs or intrusion prevention systems capable of detecting and blocking CSRF attack patterns targeting router management interfaces. 6) Session Management: Encourage or configure short session timeouts and require re-authentication for sensitive operations to limit the window of exploitation. 7) Monitor Logs: Regularly review router logs for suspicious configuration changes or access attempts that may indicate exploitation attempts. 8) Alternative Management: Where possible, use out-of-band management or dedicated management VLANs to isolate router administration from general user traffic. These measures collectively reduce the likelihood of successful exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.803Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977ad0e4623b1157cb1317c

Added to database: 1/26/2026, 6:06:06 PM

Last enriched: 3/5/2026, 9:19:17 AM

Last updated: 3/24/2026, 10:41:06 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses