Impact
The Tenda AC7 router, using firmware versions V03.03.03.01_cn and earlier, returns configuration responses that contain the router and admin panel passwords in clear text. In addition, these responses lack appropriate Cache‑Control directives, allowing web browsers to store pages that expose those credentials for later use. This vulnerability represents an information‑exposure flaw, classified as CWE‑201, and would compromise the confidentiality of administrative credentials. Based on the description, it is inferred that if an attacker obtains these passwords they could take full control of the router and its network traffic.
Affected Systems
Shenzhen Tenda Technology Co., Ltd. sells the Tenda AC7 router. The affected firmware versions are V03.03.03.01_cn and every prior release of the AC7 firmware.
Risk and Exploitability
The CVSS v3.1 score is 6.8, indicating moderate severity. The EPSS score is below 1 %, reflecting a low probability of exploitation today. The vulnerability is not listed in the CISA KEV catalogue. Based on the description, it is inferred that this vulnerability can be exploited by an attacker who has access to the router’s web‑management interface – either locally on the same network or from a remote position that can reach the management port. The lack of cache‑control also permits a malicious client to capture the credentials from cached pages, broadening the attack surface. Given the moderate score and low exploitation likelihood, the risk is moderate but real for organizations that expose this interface or use default credentials.
OpenCVE Enrichment