Impact
Shenzhen Tenda firmware up to V16.01.0.19 displays stored user account passwords in plaintext within the administrative web interface. The flaw discloses administrative credentials to any user who can access the affected management pages, exposing sensitive login information and compromising the confidentiality of device control.
Affected Systems
The vulnerability affects Shenzhen Tenda Technology Co., Ltd. W30E V2 routers running firmware versions up to V16.01.0.19(5037). Network administrators or anyone with web‑interface access to these devices can view the cleartext passwords.
Risk and Exploitability
The CVSS vector scores the issue at 7.1, indicating a high impact when exploited. EPSS is below 1 %, suggesting a low probability of exploitation, and it is not listed in CISA’s KEV catalog. The likely attack vector is local or remote access to the administrative web interface, which provides direct visibility into stored credentials. Once exposed, the attacker can use the passwords to gain full control over the device or attempt credential stuffing against other services.
OpenCVE Enrichment