Description
Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A 1.1 and H108N 2.6. A crafted request to the router web interface can expose sensitive device and account information. In affected builds, the response may include the administrator password and WLAN PSK, enabling authentication bypass and network compromise. Some firmware versions may expose only partial identifiers (e.g., serial number, ESSID, MAC addresses).
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A crafted request to the router's web interface can return the administrator password and WLAN pre‑shared key, allowing an attacker to bypass authentication and gain full control of the device and the local network. The resulting compromise threatens confidentiality, integrity, and availability of the connected systems.

Affected Systems

ZTE routers, specifically the ZXHN H298A firmware 1.1 and the H108N firmware 2.6, are affected. Firmware builds in these series may also leak partial identifiers such as serial numbers, ESSIDs, and MAC addresses.

Risk and Exploitability

Based on the description, it is inferred that the vulnerability is exploitable remotely over the router's management interface, so an attacker with network reach to the device can initiate the exploit. No CVSS score is available, but no EPSS value is published. The issue is not listed in the CISA KEV catalog. Because the vulnerability directly leaks privileged credentials, the risk of exploitation remains significant.

Generated by OpenCVE AI on May 6, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by ZTE that patches the credential exposure bug.
  • If an update is unavailable or delayed, change the default administrative password and WLAN passphrase to strong, unique values.
  • Disable remote management or restrict web interface access to trusted internal networks only, blocking exposure to the broader internet.

Generated by OpenCVE AI on May 6, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Credential Leakage via Router Web Interface
Weaknesses CWE-200

Wed, 06 May 2026 19:15:00 +0000

Type Values Removed Values Added
Description Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A 1.1 and H108N 2.6. A crafted request to the router web interface can expose sensitive device and account information. In affected builds, the response may include the administrator password and WLAN PSK, enabling authentication bypass and network compromise. Some firmware versions may expose only partial identifiers (e.g., serial number, ESSID, MAC addresses).
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-06T18:55:28.178Z

Reserved: 2026-03-27T00:00:00.000Z

Link: CVE-2026-34474

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T19:16:36.523

Modified: 2026-05-06T19:16:36.523

Link: CVE-2026-34474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T22:00:14Z

Weaknesses