Description
An incorrect access control vulnerability exists in Tenda W15E V02.03.01.26_cn. An unauthenticated attacker can access the /cgi-bin/DownloadCfg/RouterCfm.jpg endpoint to download the configuration file containing plaintext administrator credentials, leading to sensitive information disclosure and potential remote administrative access.
Published: 2026-03-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive information disclosure through unauthenticated access to the router configuration file
Action: Patch Now
AI Analysis

Impact

Tenda routers running firmware version V02.03.01.26_cn are affected by an incorrect access control flaw that allows any unauthenticated user to request the /cgi-bin/DownloadCfg/RouterCfm.jpg endpoint. This endpoint returns the entire configuration file, which contains plaintext administrator credentials. The flaw is a classic example of CWE‑284, Missing Authorization, and enables attackers to obtain sensitive information that could be leveraged to gain remote administrative control of the device.

Affected Systems

The vulnerability applies to Tenda W15E routers with firmware V02.03.01.26_cn. No other vendor or product variants are listed in the advisory; the security impact is limited to this specific model and firmware revision.

Risk and Exploitability

The CVSS base score is 7.5, indicating a high severity risk. EPSS indicates a probability of exploitation of less than 1%, and the issue is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a local network attacker interacting with the web interface, though any scenario that exposes the router’s management interface to the internet could increase risk. The vulnerability allows threat actors to download configuration files and extract privileged credentials, potentially enabling full remote control of the device.

Generated by OpenCVE AI on April 16, 2026 at 04:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Tenda firmware that fixes the access‑control flaw.
  • Configure the router to accept management traffic only from trusted local subnets or a VPN, thereby reducing external exposure.
  • Create firewall or access‑control rules to block or restrict requests to /cgi‑bin/DownloadCfg/RouterCfm.jpg from untrusted networks.

Generated by OpenCVE AI on April 16, 2026 at 04:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Title Unauthenticated Router Configuration File Disclosure due to Incorrect Access Control

Fri, 13 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda w15e Firmware
CPEs cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w15e_firmware:02.03.01.26_cn:*:*:*:*:*:*:*
Vendors & Products Tenda w15e Firmware

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda w15e
Vendors & Products Tenda
Tenda w15e

Mon, 09 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description An incorrect access control vulnerability exists in Tenda W15E V02.03.01.26_cn. An unauthenticated attacker can access the /cgi-bin/DownloadCfg/RouterCfm.jpg endpoint to download the configuration file containing plaintext administrator credentials, leading to sensitive information disclosure and potential remote administrative access.
References

Subscriptions

Tenda W15e W15e Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-11T14:28:39.384Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30140

cve-icon Vulnrichment

Updated: 2026-03-11T14:28:33.337Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T19:16:07.303

Modified: 2026-03-13T19:40:00.567

Link: CVE-2026-30140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses