CVE-2026-24435: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in Shenzhen Tenda Technology Co., Ltd. W30E V2
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) implement an insecure Cross-Origin Resource Sharing (CORS) policy on authenticated administrative endpoints. The device sets Access-Control-Allow-Origin: * in combination with Access-Control-Allow-Credentials: true, allowing attacker-controlled origins to issue credentialed cross-origin requests.
AI Analysis
Technical Summary
The vulnerability CVE-2026-24435 affects Shenzhen Tenda Technology Co., Ltd.'s W30E V2 router firmware versions up to V16.01.0.19(5037). The core issue is a permissive Cross-Origin Resource Sharing (CORS) policy implemented on authenticated administrative endpoints. Specifically, the device sets the HTTP header Access-Control-Allow-Origin to '*', which allows any web origin to access resources, combined with Access-Control-Allow-Credentials set to true, enabling browsers to send credentials such as cookies or HTTP authentication information in cross-origin requests. This combination violates the security model of CORS, as it permits attacker-controlled websites to perform credentialed requests to the router's administrative interface without proper origin restrictions. Since the endpoints are authenticated, the attack relies on the victim being logged into the router's admin interface in their browser. An attacker can craft malicious web pages that, when visited by the user, can silently issue requests to the router, potentially extracting sensitive information or modifying configurations. The vulnerability does not require prior authentication by the attacker and does not require complex attack vectors beyond user interaction (visiting a malicious site). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality. No known exploits have been reported in the wild yet, but the vulnerability is publicly disclosed and rated high severity. The CWE-942 classification identifies this as a permissive cross-domain policy with untrusted domains, a common web security misconfiguration. The lack of a patch link suggests that a firmware update addressing this issue is not yet publicly available, emphasizing the need for interim mitigations.
Potential Impact
The vulnerability can lead to unauthorized disclosure of sensitive administrative data and unauthorized modification of router configurations. Attackers can leverage this flaw to hijack router settings, potentially redirecting traffic, disabling security features, or creating persistent backdoors. This compromises the confidentiality and integrity of network infrastructure managed by the affected devices. Since routers are critical network gateways, exploitation can have cascading effects on the security posture of entire organizational networks, including exposure of internal systems and interception of communications. The attack requires user interaction but no attacker authentication, making phishing or drive-by attacks feasible. The widespread use of Tenda routers in residential, small business, and some enterprise environments increases the attack surface. The vulnerability could be exploited to facilitate larger-scale attacks such as man-in-the-middle, data exfiltration, or lateral movement within networks. Although availability impact is not indicated, the compromise of administrative controls can indirectly affect network stability and reliability.
Mitigation Recommendations
Organizations should immediately restrict access to the router's administrative interface by implementing network segmentation and firewall rules that limit management access to trusted IP addresses only. Disable remote administration features if not required. Monitor network traffic for suspicious cross-origin requests targeting router management endpoints. Educate users to avoid visiting untrusted websites while logged into router administration portals. Until an official firmware patch is released, consider deploying web application firewalls or reverse proxies that can enforce stricter CORS policies or block unauthorized cross-origin requests. Regularly check for firmware updates from Shenzhen Tenda and apply them promptly once available. For critical environments, consider replacing affected devices with models from vendors with stronger security track records. Conduct periodic security assessments to detect unauthorized configuration changes or anomalous router behavior. Implement multi-factor authentication on router management interfaces if supported to reduce risk from credential theft.
Affected Countries
China, India, Russia, Brazil, Indonesia, Vietnam, South Africa, Mexico, Thailand, Turkey
CVE-2026-24435: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in Shenzhen Tenda Technology Co., Ltd. W30E V2
Description
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) implement an insecure Cross-Origin Resource Sharing (CORS) policy on authenticated administrative endpoints. The device sets Access-Control-Allow-Origin: * in combination with Access-Control-Allow-Credentials: true, allowing attacker-controlled origins to issue credentialed cross-origin requests.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-24435 affects Shenzhen Tenda Technology Co., Ltd.'s W30E V2 router firmware versions up to V16.01.0.19(5037). The core issue is a permissive Cross-Origin Resource Sharing (CORS) policy implemented on authenticated administrative endpoints. Specifically, the device sets the HTTP header Access-Control-Allow-Origin to '*', which allows any web origin to access resources, combined with Access-Control-Allow-Credentials set to true, enabling browsers to send credentials such as cookies or HTTP authentication information in cross-origin requests. This combination violates the security model of CORS, as it permits attacker-controlled websites to perform credentialed requests to the router's administrative interface without proper origin restrictions. Since the endpoints are authenticated, the attack relies on the victim being logged into the router's admin interface in their browser. An attacker can craft malicious web pages that, when visited by the user, can silently issue requests to the router, potentially extracting sensitive information or modifying configurations. The vulnerability does not require prior authentication by the attacker and does not require complex attack vectors beyond user interaction (visiting a malicious site). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality. No known exploits have been reported in the wild yet, but the vulnerability is publicly disclosed and rated high severity. The CWE-942 classification identifies this as a permissive cross-domain policy with untrusted domains, a common web security misconfiguration. The lack of a patch link suggests that a firmware update addressing this issue is not yet publicly available, emphasizing the need for interim mitigations.
Potential Impact
The vulnerability can lead to unauthorized disclosure of sensitive administrative data and unauthorized modification of router configurations. Attackers can leverage this flaw to hijack router settings, potentially redirecting traffic, disabling security features, or creating persistent backdoors. This compromises the confidentiality and integrity of network infrastructure managed by the affected devices. Since routers are critical network gateways, exploitation can have cascading effects on the security posture of entire organizational networks, including exposure of internal systems and interception of communications. The attack requires user interaction but no attacker authentication, making phishing or drive-by attacks feasible. The widespread use of Tenda routers in residential, small business, and some enterprise environments increases the attack surface. The vulnerability could be exploited to facilitate larger-scale attacks such as man-in-the-middle, data exfiltration, or lateral movement within networks. Although availability impact is not indicated, the compromise of administrative controls can indirectly affect network stability and reliability.
Mitigation Recommendations
Organizations should immediately restrict access to the router's administrative interface by implementing network segmentation and firewall rules that limit management access to trusted IP addresses only. Disable remote administration features if not required. Monitor network traffic for suspicious cross-origin requests targeting router management endpoints. Educate users to avoid visiting untrusted websites while logged into router administration portals. Until an official firmware patch is released, consider deploying web application firewalls or reverse proxies that can enforce stricter CORS policies or block unauthorized cross-origin requests. Regularly check for firmware updates from Shenzhen Tenda and apply them promptly once available. For critical environments, consider replacing affected devices with models from vendors with stronger security track records. Conduct periodic security assessments to detect unauthorized configuration changes or anomalous router behavior. Implement multi-factor authentication on router management interfaces if supported to reduce risk from credential theft.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-22T20:23:19.803Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977ad0e4623b1157cb13180
Added to database: 1/26/2026, 6:06:06 PM
Last enriched: 3/5/2026, 9:20:28 AM
Last updated: 3/23/2026, 8:28:29 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.