Логотип exploitDog
bind:CVE-2026-24428
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-24428

Количество 3

Количество 3

nvd логотип

CVE-2026-24428

9 дней назад

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-ww5j-8g6w-h99h

9 дней назад

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2026-00939

10 дней назад

Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, связанная с недостатками механизма авторизации, позволяющая нарушителю обойти ограничения безопасности и повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-24428

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges.

CVSS3: 8.8
0%
Низкий
9 дней назад
github логотип
GHSA-ww5j-8g6w-h99h

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges.

CVSS3: 8.8
0%
Низкий
9 дней назад
fstec логотип
BDU:2026-00939

Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, связанная с недостатками механизма авторизации, позволяющая нарушителю обойти ограничения безопасности и повысить свои привилегии

CVSS3: 8.8
0%
Низкий
10 дней назад

Уязвимостей на страницу