CVE-2026-24436

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against administrative credentials.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:2.0:*:*:*:*:*:*:*

History

28 Jan 2026, 19:57

Type Values Removed Values Added
First Time Tenda
Tenda w30e Firmware
Tenda w30e
CPE cpe:2.3:h:tenda:w30e:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://www.tendacn.com/product/W30E - () https://www.tendacn.com/product/W30E - Product
References () https://www.vulncheck.com/advisories/tenda-w30e-v2-lacks-rate-limiting-on-authentication - () https://www.vulncheck.com/advisories/tenda-w30e-v2-lacks-rate-limiting-on-authentication - Third Party Advisory

26 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-26 18:16

Updated : 2026-01-28 19:57


NVD link : CVE-2026-24436

Mitre link : CVE-2026-24436

CVE.ORG link : CVE-2026-24436


JSON object : View

Products Affected

tenda

  • w30e
  • w30e_firmware
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts