An issue was discovered on Tenda AC9 V15.03.05.19(6318)_CN and AC10 V15.03.06.23_CN devices. The mac parameter in a POST request is used directly in a doSystemCmd call, causing OS command injection.
References
Link | Resource |
---|---|
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md | Exploit Third Party Advisory |
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md - Exploit, Third Party Advisory |
Information
Published : 2018-09-02 03:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16334
Mitre link : CVE-2018-16334
CVE.ORG link : CVE-2018-16334
JSON object : View
Products Affected
tendacn
- ac10_firmware
- ac9
- ac10
- ac9_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')