Impact
Shenzhen Tenda W30E V2 firmware releases through V16.01.0.19(5037) expose account credentials in cleartext within HTTP responses generated by the maintenance interface. This flaw allows sensitive information leakage and violates confidentiality. The weakness is a known data‑exposure vulnerability (CWE-201).
Affected Systems
The affected product is the Tenda W30E V2 router from Shenzhen Tenda Technology Co., Ltd. Version families up to and including firmware V16.01.0.19(5037) are impacted. These devices expose credentials for the local management interface via HTTP.
Risk and Exploitability
The CVSS v3 base score of 8.2 classifies this as a high‑severity flaw. EPSS indicates a very low exploitation probability (<1 %) and it is not listed in the CISA KEV catalog. Attackers would need to be on the same networking segment to intercept unencrypted HTTP traffic to the device’s maintenance interface; no elevated privileges or code execution are required. The risk is concentrated on confidentiality compromise rather than denial of service or availability impacts.
OpenCVE Enrichment