CVE-2026-34472: n/a
Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A V6.0.10P2_TE and V6.0.10P3N3_TE allows unauthenticated attackers on the local network to retrieve sensitive credentials from the router's web management interface, including the default administrator password, WLAN PSK, and PPPoE credentials. In some observed cases, configuration changes may also be performed without authentication.
AI Analysis
Technical Summary
CVE-2026-34472 is a security vulnerability identified in the ZTE ZXHN H188A router firmware versions V6.0.10P2_TE and V6.0.10P3N3_TE. The flaw resides in the router's web management wizard interface, which improperly exposes sensitive credentials without requiring any authentication. Specifically, an attacker connected to the local network can retrieve the default administrator password, WLAN PSK, and PPPoE credentials. These credentials are critical for controlling the router and accessing the network. Additionally, in some observed instances, the vulnerability allows unauthenticated attackers to perform configuration changes on the device, further escalating the risk. The vulnerability does not require user interaction, and exploitation is limited to attackers with local network access, such as those connected via Wi-Fi or Ethernet. The absence of authentication checks in the wizard interface represents a significant security design flaw. No patches or fixes are currently linked, and no public exploits have been reported, but the potential for abuse is substantial given the sensitive nature of the exposed data. This vulnerability could be leveraged to gain persistent unauthorized access to the network, intercept or manipulate traffic, or disrupt network availability.
Potential Impact
The impact of CVE-2026-34472 is significant for organizations using the affected ZTE ZXHN H188A router models. Exposure of administrator credentials and WLAN PSK enables attackers to gain full control over the router, potentially allowing them to intercept, modify, or redirect network traffic, leading to confidentiality and integrity breaches. Disclosure of PPPoE credentials can allow attackers to impersonate legitimate users on the ISP network, potentially causing service disruptions or unauthorized usage. The ability to perform configuration changes without authentication further increases the risk of persistent compromise, network downtime, or the introduction of malicious configurations such as DNS hijacking or firewall rule modifications. Organizations relying on these routers for critical network infrastructure may face operational disruptions, data breaches, and increased attack surface for lateral movement within internal networks. The vulnerability's exploitation could also facilitate further attacks against connected devices and services, amplifying the overall security risk.
Mitigation Recommendations
To mitigate CVE-2026-34472, organizations should immediately restrict local network access to trusted users and devices, minimizing exposure to potential attackers. Network segmentation should be employed to isolate management interfaces from general user access. Disable or restrict access to the router's web management wizard interface if possible. Monitor network traffic for unusual access patterns or unauthorized configuration changes. Since no official patches are currently available, consider upgrading to newer firmware versions once released by ZTE that address this vulnerability. If upgrading is not immediately feasible, replace affected devices with alternative routers that do not exhibit this vulnerability. Implement strong network access controls, including MAC address filtering and WPA3 encryption where supported, to reduce the risk of unauthorized local network access. Regularly audit router configurations and credentials to detect unauthorized changes or disclosures. Finally, maintain awareness of updates from ZTE and security advisories to apply patches promptly when available.
Affected Countries
China, India, Brazil, Russia, Indonesia, Vietnam, Egypt, South Africa, Mexico, Turkey
CVE-2026-34472: n/a
Description
Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A V6.0.10P2_TE and V6.0.10P3N3_TE allows unauthenticated attackers on the local network to retrieve sensitive credentials from the router's web management interface, including the default administrator password, WLAN PSK, and PPPoE credentials. In some observed cases, configuration changes may also be performed without authentication.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34472 is a security vulnerability identified in the ZTE ZXHN H188A router firmware versions V6.0.10P2_TE and V6.0.10P3N3_TE. The flaw resides in the router's web management wizard interface, which improperly exposes sensitive credentials without requiring any authentication. Specifically, an attacker connected to the local network can retrieve the default administrator password, WLAN PSK, and PPPoE credentials. These credentials are critical for controlling the router and accessing the network. Additionally, in some observed instances, the vulnerability allows unauthenticated attackers to perform configuration changes on the device, further escalating the risk. The vulnerability does not require user interaction, and exploitation is limited to attackers with local network access, such as those connected via Wi-Fi or Ethernet. The absence of authentication checks in the wizard interface represents a significant security design flaw. No patches or fixes are currently linked, and no public exploits have been reported, but the potential for abuse is substantial given the sensitive nature of the exposed data. This vulnerability could be leveraged to gain persistent unauthorized access to the network, intercept or manipulate traffic, or disrupt network availability.
Potential Impact
The impact of CVE-2026-34472 is significant for organizations using the affected ZTE ZXHN H188A router models. Exposure of administrator credentials and WLAN PSK enables attackers to gain full control over the router, potentially allowing them to intercept, modify, or redirect network traffic, leading to confidentiality and integrity breaches. Disclosure of PPPoE credentials can allow attackers to impersonate legitimate users on the ISP network, potentially causing service disruptions or unauthorized usage. The ability to perform configuration changes without authentication further increases the risk of persistent compromise, network downtime, or the introduction of malicious configurations such as DNS hijacking or firewall rule modifications. Organizations relying on these routers for critical network infrastructure may face operational disruptions, data breaches, and increased attack surface for lateral movement within internal networks. The vulnerability's exploitation could also facilitate further attacks against connected devices and services, amplifying the overall security risk.
Mitigation Recommendations
To mitigate CVE-2026-34472, organizations should immediately restrict local network access to trusted users and devices, minimizing exposure to potential attackers. Network segmentation should be employed to isolate management interfaces from general user access. Disable or restrict access to the router's web management wizard interface if possible. Monitor network traffic for unusual access patterns or unauthorized configuration changes. Since no official patches are currently available, consider upgrading to newer firmware versions once released by ZTE that address this vulnerability. If upgrading is not immediately feasible, replace affected devices with alternative routers that do not exhibit this vulnerability. Implement strong network access controls, including MAC address filtering and WPA3 encryption where supported, to reduce the risk of unauthorized local network access. Regularly audit router configurations and credentials to detect unauthorized changes or disclosures. Finally, maintain awareness of updates from ZTE and security advisories to apply patches promptly when available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69ca9c6fe6bfc5ba1d4725b0
Added to database: 3/30/2026, 3:53:19 PM
Last enriched: 3/30/2026, 4:08:59 PM
Last updated: 3/31/2026, 5:01:51 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.