Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24437: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Shenzhen Tenda Technology Co., Ltd. W30E V2

0
Medium
VulnerabilityCVE-2026-24437cvecve-2026-24437cwe-525
Published: Mon Jan 26 2026 (01/26/2026, 17:40:22 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: W30E V2

Description

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) serve sensitive administrative content without appropriate cache-control directives. As a result, browsers may store credential-bearing responses locally, exposing them to subsequent unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:21:00 UTC

Technical Analysis

CVE-2026-24437 is a vulnerability in the firmware of Shenzhen Tenda Technology Co., Ltd.'s W30E V2 router, specifically in versions up to 16.01.0.19(5037). The root cause is the absence of appropriate cache-control directives in HTTP responses serving sensitive administrative content. Cache-control headers such as 'no-store' or 'private' are missing, which leads browsers to store credential-bearing responses in their local cache. This cached data can include sensitive information like session tokens or administrative credentials. An attacker with local access to the device or the user’s browser cache can retrieve these cached responses, thereby gaining unauthorized access to sensitive information. The vulnerability is classified under CWE-525, which concerns the use of web browser cache containing sensitive information. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low complexity (AC:L), no privileges (PR:L), no user interaction (UI:N), and results in low confidentiality impact (VC:L) with no impact on integrity or availability. No patches or exploits are currently known, but the exposure risk remains significant for environments where physical or local access is possible.

Potential Impact

The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive administrative credentials or session tokens stored in the browser cache. This can lead to unauthorized access to the router’s administrative interface, allowing attackers to alter configurations, intercept network traffic, or pivot into internal networks. Organizations relying on Shenzhen Tenda W30E V2 routers may face increased risk of network compromise, especially in environments where multiple users share devices or where physical security is limited. The vulnerability does not directly affect system integrity or availability but compromises confidentiality, which can cascade into broader security breaches. Since exploitation requires local access to the browser cache, the risk is higher in shared or public environments, or where endpoint security is weak. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-24437, organizations should: 1) Upgrade the firmware to a version that includes proper cache-control headers once available from Shenzhen Tenda. 2) Until a patch is released, restrict physical and local access to devices and user systems to prevent unauthorized access to browser caches. 3) Configure browsers to clear cache and history regularly, especially after administrative sessions, or use private/incognito browsing modes when accessing router interfaces. 4) Implement endpoint security controls that limit access to browser cache files, including disk encryption and user access controls. 5) Network administrators should monitor for unusual administrative access patterns that may indicate credential compromise. 6) Consider segmenting management interfaces away from general user access to reduce exposure. 7) Educate users about the risks of cached credentials and encourage best practices for device and browser security.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.803Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977a98b4623b1157caf783d

Added to database: 1/26/2026, 5:51:07 PM

Last enriched: 3/5/2026, 9:21:00 AM

Last updated: 3/26/2026, 11:09:31 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses