Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda w30e Firmware
|
|
| CPEs | cpe:2.3:h:tenda:w30e:2.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:w30e_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda w30e Firmware
|
|
| Metrics |
cvssV3_1
|
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda w30e |
|
| Vendors & Products |
Tenda
Tenda w30e |
Mon, 26 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges. | |
| Title | Tenda W30E V2 Incorrect Authorization Allows Administrator Password Change | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:09:30.992Z
Reserved: 2026-01-22T20:23:19.802Z
Link: CVE-2026-24428
Updated: 2026-02-03T18:57:25.736Z
Status : Analyzed
Published: 2026-01-26T18:16:40.117
Modified: 2026-01-29T13:02:04.990
Link: CVE-2026-24428
No data.
OpenCVE Enrichment
Updated: 2026-04-16T17:45:27Z