Vulnerability Description
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | W30E Firmware | <= 16.01.0.19\(5037\) |
| Tenda | W30E | 2.0 |
Related Weaknesses (CWE)
References
- https://www.tendacn.com/product/W30EProduct
- https://www.vulncheck.com/advisories/tenda-w30e-v2-incorrect-authorization-allowThird Party Advisory
FAQ
What is CVE-2026-24428?
CVE-2026-24428 is a vulnerability with a CVSS score of 8.8 (HIGH). Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the ad...
How severe is CVE-2026-24428?
CVE-2026-24428 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24428?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda W30E Firmware, Tenda W30E.