Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated access to the management interface.
References
| Link | Resource |
|---|---|
| https://www.tendacn.com/product/W30E | Product |
| https://www.vulncheck.com/advisories/tenda-w30e-v2-hardcoded-default-password-for-built-in-account | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-26 18:16
Updated : 2026-01-29 13:01
NVD link : CVE-2026-24429
Mitre link : CVE-2026-24429
CVE.ORG link : CVE-2026-24429
JSON object : View
Products Affected
tenda
- w30e
- w30e_firmware
CWE
CWE-1393
Use of Default Password
