An issue was discovered on Tenda AC15 devices. A remote, unauthenticated attacker can make a request to /goform/telnet, creating a telnetd service on the device. This service is password protected; however, several default accounts exist on the device that are root accounts, which can be used to log in.
References
Link | Resource |
---|---|
https://www.fidusinfosec.com/tenda-ac15-unauthenticated-telnetd-start-cve-2018-5770/ | Exploit Third Party Advisory |
https://www.fidusinfosec.com/tenda-ac15-unauthenticated-telnetd-start-cve-2018-5770/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.fidusinfosec.com/tenda-ac15-unauthenticated-telnetd-start-cve-2018-5770/ - Exploit, Third Party Advisory |
Information
Published : 2018-03-20 15:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5770
Mitre link : CVE-2018-5770
CVE.ORG link : CVE-2018-5770
JSON object : View
Products Affected
tendacn
- ac15
- ac15_firmware
CWE
CWE-1188
Insecure Default Initialization of Resource