CVE-2026-24433
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-26

Last updated on: 2026-01-28

Assigner: VulnCheck

Description
Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain a stored cross-site scripting vulnerability in the user creation functionality. Insufficient input validation allows attacker-controlled script content to be stored and later executed when administrative users access the affected management pages.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-26
Last Modified
2026-01-28
Generated
2026-05-07
AI Q&A
2026-01-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tenda w30e_firmware to 16.01.0.19\(5037\) (inc)
tenda w30e 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue in the Shenzhen Tenda W30E V2 router firmware up to version 16.01.0.19(5037). It occurs in the user creation functionality due to insufficient input validation of the username field. An attacker can inject malicious script code that is stored persistently and later executed when administrative users access the affected management pages. [1]


How can this vulnerability impact me? :

The vulnerability allows an attacker to execute malicious scripts in the context of the router's administrative interface when an admin accesses the affected pages. This can lead to unauthorized actions performed with admin privileges, potentially compromising the router's configuration or security. However, the impact on confidentiality, integrity, and availability is considered low. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of malicious script content in the username field of user accounts created on the Tenda W30E V2 router firmware versions up to v16.01.0.19(5037). Since the vulnerability involves stored cross-site scripting in the user creation functionality, you can inspect the user list or user creation logs for suspicious script tags or unusual characters. Specific commands are not provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of affected firmware versions (up to v16.01.0.19(5037)) and restricting administrative access to the router's management pages to trusted users only. Additionally, monitor and sanitize user inputs in the user creation functionality to prevent injection of malicious scripts. Since no patch or update information is provided, consider disabling user creation functionality if possible until a fix is available. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart