CVE-2026-24433
BaseFortify
Publication date: 2026-01-26
Last updated on: 2026-01-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | w30e_firmware | to 16.01.0.19\(5037\) (inc) |
| tenda | w30e | 2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue in the Shenzhen Tenda W30E V2 router firmware up to version 16.01.0.19(5037). It occurs in the user creation functionality due to insufficient input validation of the username field. An attacker can inject malicious script code that is stored persistently and later executed when administrative users access the affected management pages. [1]
How can this vulnerability impact me? :
The vulnerability allows an attacker to execute malicious scripts in the context of the router's administrative interface when an admin accesses the affected pages. This can lead to unauthorized actions performed with admin privileges, potentially compromising the router's configuration or security. However, the impact on confidentiality, integrity, and availability is considered low. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of malicious script content in the username field of user accounts created on the Tenda W30E V2 router firmware versions up to v16.01.0.19(5037). Since the vulnerability involves stored cross-site scripting in the user creation functionality, you can inspect the user list or user creation logs for suspicious script tags or unusual characters. Specific commands are not provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of affected firmware versions (up to v16.01.0.19(5037)) and restricting administrative access to the router's management pages to trusted users only. Additionally, monitor and sanitize user inputs in the user creation functionality to prevent injection of malicious scripts. Since no patch or update information is provided, consider disabling user creation functionality if possible until a fix is available. [1]