Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24441: CWE-319 Cleartext Transmission of Sensitive Information in Shenzhen Tenda Technology Co., Ltd. Tenda AC7

0
High
VulnerabilityCVE-2026-24441cvecve-2026-24441cwe-319
Published: Tue Feb 03 2026 (02/03/2026, 19:14:41 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Tenda Technology Co., Ltd.
Product: Tenda AC7

Description

CVE-2026-24441 is a high-severity vulnerability in Shenzhen Tenda AC7 routers running firmware version V03. 03. 03. 01_cn and earlier. The flaw involves the cleartext transmission of sensitive authentication credentials within HTTP responses, exposing them to on-path attackers. Exploitation requires network access but no authentication or user interaction, and the vulnerability can lead to credential compromise. Although no known exploits are currently reported in the wild, the impact on confidentiality is significant. European organizations using affected Tenda AC7 devices are at risk, especially in environments with untrusted or poorly segmented networks. Mitigation requires upgrading firmware once available or isolating vulnerable devices from untrusted networks. Countries with higher adoption of Tenda networking equipment and strategic infrastructure relying on these devices are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/03/2026, 19:59:30 UTC

Technical Analysis

CVE-2026-24441 is a vulnerability identified in the firmware of Shenzhen Tenda Technology Co., Ltd.'s Tenda AC7 router, specifically firmware version V03.03.03.01_cn and prior. The vulnerability is classified under CWE-319, which pertains to the cleartext transmission of sensitive information. In this case, the router's HTTP responses expose account credentials in plaintext, allowing an attacker positioned on the network path (on-path attacker) to intercept and obtain sensitive authentication material without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 8.2, indicating high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. This means that while the attack is somewhat complex, it can be executed remotely by an unauthenticated attacker who can intercept network traffic. The exposure of plaintext credentials can lead to unauthorized access to the router’s management interface, potentially allowing further compromise of the network. No patches or exploits are currently reported, but the vulnerability poses a significant risk given the nature of the information exposed and the critical role of routers in network security.

Potential Impact

For European organizations, the exposure of router credentials in plaintext can lead to unauthorized administrative access, enabling attackers to manipulate network configurations, intercept or redirect traffic, or deploy further malware within the network. This compromises confidentiality and potentially the integrity of network communications. Organizations relying on Tenda AC7 routers in office or industrial environments may face increased risk of espionage, data leakage, or disruption of services. The vulnerability is particularly concerning in environments with shared or public networks, or where network segmentation is weak. Given the router’s role as a network gateway, compromise can have cascading effects on connected systems. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

Immediate mitigation involves isolating Tenda AC7 devices running vulnerable firmware from untrusted or public networks to prevent on-path interception. Network administrators should enforce strict network segmentation and use VPNs or encrypted tunnels for management access to reduce exposure. Monitoring network traffic for unusual access patterns to router management interfaces can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with Shenzhen Tenda Technology for firmware updates and apply them promptly once released. As a longer-term measure, consider replacing vulnerable devices with models that enforce secure management protocols such as HTTPS with strong encryption and do not transmit credentials in cleartext. Implementing network-level protections such as intrusion detection systems (IDS) and secure DNS can also help mitigate exploitation risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-22T20:23:19.804Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69825048f9fa50a62fdc19aa

Added to database: 2/3/2026, 7:45:12 PM

Last enriched: 2/3/2026, 7:59:30 PM

Last updated: 2/3/2026, 8:48:14 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats