Description
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior contain an improper output encoding vulnerability in the web management interface. User-supplied input is reflected in HTTP responses without adequate escaping, allowing injection of arbitrary HTML or JavaScript in a victim’s browser context.
Published: 2026-02-03
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Patch Firmware
AI Analysis

Impact

This vulnerability is an improper output encoding flaw in Shenzhen Tenda AC7's web management interface. Inputs supplied by users are reflected in HTTP responses without proper escaping, enabling attackers to inject arbitrary HTML or JavaScript. The flaw can be exploited to execute malicious scripts in the victim's browser session, potentially leading to session hijacking, defacement, or data theft. The weakness is classified as CWE‑79.

Affected Systems

The affected hardware is the Shenzhen Tenda AC7 router, specifically firmware versions V03.03.03.01_cn and all earlier releases. Users of these firmware builds who can access the device's web interface are vulnerable, and the issue persists across all models that ship with the same embedded web server code.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity, but the EPSS score of less than 1% and absence from CISA's KEV list suggest that exploitation is unlikely at present. Attackers would likely craft a malicious URL or form that includes the unsanitized user input and lure a legitimate user to visit that link while connected to the local network. In environments where the web interface is exposed to external networks or used by multiple users, the risk of successful exploitation rises. Mitigation requires firmware updates that address improper output encoding, along with network segmentation or access control to limit who can reach the interface.

Generated by OpenCVE AI on April 16, 2026 at 17:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Tenda AC7 firmware that includes a fix for improper output encoding in the web interface.
  • Restrict access to the device's web management interface to local traffic only or limit it to trusted IP ranges.
  • Apply web application firewall or proxy rules that escape or sanitize user‑provided data in HTTP responses before they reach the client.

Generated by OpenCVE AI on April 16, 2026 at 17:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac7 Firmware
CPEs cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac7_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda ac7 Firmware
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ac7
Vendors & Products Tenda
Tenda ac7

Tue, 03 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior contain an improper output encoding vulnerability in the web management interface. User-supplied input is reflected in HTTP responses without adequate escaping, allowing injection of arbitrary HTML or JavaScript in a victim’s browser context.
Title Tenda AC7 Reflected XSS via Web Interface Output Encoding
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:30:28.338Z

Reserved: 2026-01-22T20:23:19.802Z

Link: CVE-2026-24426

cve-icon Vulnrichment

Updated: 2026-02-03T19:49:51.644Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T19:16:16.390

Modified: 2026-02-10T14:13:03.557

Link: CVE-2026-24426

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:30:26Z

Weaknesses