CVE-2020-26728

A vulnerability was discovered in Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN which allows for remote code execution via shell metacharacters in the guestuser field to the __fastcall function with a POST request.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac9:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tenda:ac9_firmware:15.03.05.19\(6318\)_cn:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:20

Type Values Removed Values Added
References () https://github.com/Lyc-heng/Router/blob/main/Tenda/rce1.md - Broken Link () https://github.com/Lyc-heng/Router/blob/main/Tenda/rce1.md - Broken Link
References () https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md - Exploit, Third Party Advisory () https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md - Exploit, Third Party Advisory
References () https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md - Exploit, Third Party Advisory () https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md - Exploit, Third Party Advisory

Information

Published : 2022-02-11 19:15

Updated : 2024-11-21 05:20


NVD link : CVE-2020-26728

Mitre link : CVE-2020-26728

CVE.ORG link : CVE-2020-26728


JSON object : View

Products Affected

tenda

  • ac9
  • ac9_firmware