CVE-2026-24427
Information Disclosure in Tenda AC7 Firmware Exposes Admin Credentials
Publication date: 2026-02-03
Last updated on: 2026-02-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | ac7_firmware | to 03.03.03.01 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-201 | The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of administrative credentials if an attacker accesses the client system or browser profile where cached configuration pages are stored.
With these credentials exposed in plaintext, an attacker could potentially gain administrative access to the router, allowing them to control network settings, intercept traffic, or perform other malicious activities.
Can you explain this vulnerability to me?
This vulnerability affects the Shenzhen Tenda AC7 router firmware version V03.03.03.01_cn and earlier. It exposes sensitive administrative credentials, such as the router and admin panel passwords, in plaintext within the web management configuration response bodies.
Additionally, the responses from the router lack proper Cache-Control headers, which means that web browsers may cache these pages containing sensitive credentials. This cached information can then be accessed by an attacker who gains access to the client system or browser profile.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by inspecting the web management configuration response bodies from the Tenda AC7 router firmware version V03.03.03.01_cn and prior. Specifically, look for plaintext administrative credentials such as router or admin panel passwords within these responses.'}, {'type': 'paragraph', 'content': 'Additionally, check if the HTTP responses lack appropriate Cache-Control headers, which may allow sensitive pages to be cached by web browsers.'}, {'type': 'paragraph', 'content': "Commands to assist detection might include using network traffic capture tools like tcpdump or Wireshark to capture HTTP responses from the router's web management interface and then searching for plaintext credentials or missing Cache-Control headers."}, {'type': 'list_item', 'content': 'Use tcpdump to capture HTTP traffic from the router: tcpdump -i <interface> -A port 80'}, {'type': 'list_item', 'content': "Use curl or wget to fetch the router's configuration page and inspect the response headers and body for plaintext credentials and Cache-Control directives: curl -v http://<router-ip>/config"}, {'type': 'list_item', 'content': "Search captured data for keywords like 'password' or 'admin' to identify exposed credentials."}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Immediate mitigation steps include updating the Tenda AC7 router firmware to a version later than V03.03.03.01_cn where this vulnerability is fixed.'}, {'type': 'paragraph', 'content': "If an update is not immediately available, restrict access to the router's web management interface to trusted networks or IP addresses only, minimizing exposure."}, {'type': 'paragraph', 'content': 'Clear browser caches regularly to reduce the risk of cached sensitive information being accessed by unauthorized users.'}, {'type': 'paragraph', 'content': 'Change administrative passwords after applying mitigations to ensure any potentially exposed credentials are no longer valid.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability exposes administrative credentials in plaintext and allows caching of sensitive information, which can lead to unauthorized disclosure if an attacker accesses the client system or browser profile.
Such exposure of sensitive information can result in non-compliance with common data protection standards and regulations like GDPR and HIPAA, which require the protection of sensitive data and credentials to prevent unauthorized access and data breaches.