CVE-2026-24429

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated access to the management interface.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*

History

29 Jan 2026, 13:01

Type Values Removed Values Added
References () https://www.tendacn.com/product/W30E - () https://www.tendacn.com/product/W30E - Product
References () https://www.vulncheck.com/advisories/tenda-w30e-v2-hardcoded-default-password-for-built-in-account - () https://www.vulncheck.com/advisories/tenda-w30e-v2-hardcoded-default-password-for-built-in-account - Third Party Advisory
CPE cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*
First Time Tenda
Tenda w30e Firmware
Tenda w30e
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

26 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-26 18:16

Updated : 2026-01-29 13:01


NVD link : CVE-2026-24429

Mitre link : CVE-2026-24429

CVE.ORG link : CVE-2026-24429


JSON object : View

Products Affected

tenda

  • w30e
  • w30e_firmware
CWE
CWE-1393

Use of Default Password