CVE-2026-24430

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be exposed to network-based interception.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:2.0:*:*:*:*:*:*:*

History

28 Jan 2026, 20:16

Type Values Removed Values Added
CPE cpe:2.3:h:tenda:w30e:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:*
References () https://www.tendacn.com/product/W30E - () https://www.tendacn.com/product/W30E - Product
References () https://www.vulncheck.com/advisories/tenda-w30e-v2-http-responses-expose-plaintext-credentials - () https://www.vulncheck.com/advisories/tenda-w30e-v2-http-responses-expose-plaintext-credentials - Third Party Advisory
First Time Tenda
Tenda w30e Firmware
Tenda w30e
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

26 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-26 18:16

Updated : 2026-01-28 20:16


NVD link : CVE-2026-24430

Mitre link : CVE-2026-24430

CVE.ORG link : CVE-2026-24430


JSON object : View

Products Affected

tenda

  • w30e
  • w30e_firmware
CWE
CWE-201

Insertion of Sensitive Information Into Sent Data