CVE-2020-35391

Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:f3_firmware:12.01.01.48:*:*:*:*:*:*:*
cpe:2.3:h:tenda:f3:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:21

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@signalhilltech/tenda-n300-authentication-bypass-via-malformed-http-request-header-5b8744ca685e', 'name': 'https://medium.com/@signalhilltech/tenda-n300-authentication-bypass-via-malformed-http-request-header-5b8744ca685e', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40signalhilltech/tenda-n300-authentication-bypass-via-malformed-http-request-header-5b8744ca685e -

Information

Published : 2021-01-01 07:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-35391

Mitre link : CVE-2020-35391

CVE.ORG link : CVE-2020-35391


JSON object : View

Products Affected

tenda

  • f3_firmware
  • f3
CWE
CWE-425

Direct Request ('Forced Browsing')