Impact
Shenzhen Tenda W30E V2 firmware versions up to V16.01.0.19(5037) do not protect administrative endpoints against cross‑site request forgery. An attacker can craft a malicious request that, when executed by a browser of an authenticated user, changes administrator passwords and other configuration settings. The vulnerability enables unauthorized modification of device settings and can lead to loss of administrative control.
Affected Systems
The affected device is the Shenzhen Tenda W30E V2 router. Firmware versions V16.01.0.19(5037) and earlier are vulnerable. The product is listed in the Tenda company catalogue and is commonly deployed in home and small‑office networks.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. The EPSS score of less than 1% shows a very low likelihood of current exploitation, and the vulnerability is not present in the CISA KEV catalog. The attack vector is inferred to be a browser‑based CSRF, requiring an authenticated user to visit a specially crafted URL. The vulnerability domain is alignment with CWE‑352: Cross‑Site Request Forgery.
OpenCVE Enrichment