An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component.# [CVE-2024-24488](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24488)
An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component.
# Tested Versions
CP3V2.0 - V11.10.00.2311090948
# CWE
CWE-313: Cleartext Storage in a File or on Disk
## Vulnerability Overview
Devices affected by this vulnerability can access the passwords of WiFi routers they are connected to through a specific file path. The path in question contains a file where sensitive information, including the WiFi router's password, is stored in plaintext.
### Vulnerable File Path
The sensitive information can be found at:
```/app/userdata/ifcfg.wlan0```
[4.0K] /data/pocs/c2c090613692dc3d2e008857e0324a8c5c100d63
├── [4.0K] app
│ └── [4.0K] userdata
│ └── [ 83] ifcfg.wlan0
└── [ 730] README.md
2 directories, 2 files