CVE-2020-6868

There is an input validation vulnerability in a PON terminal product of ZTE, which supports the creation of WAN connections through WEB management pages. The front-end limits the length of the WAN connection name that is created, but the HTTP proxy is available to be used to bypass the limitation. An attacker can exploit the vulnerability to tamper with the parameter value. This affects: ZTE F680 V9.0.10P1N6
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zte:f680_firmware:zxhn_f680v9.0.10p1n6:*:*:*:*:*:*:*
cpe:2.3:h:zte:f680:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012866 - Vendor Advisory () http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012866 - Vendor Advisory

Information

Published : 2020-06-01 13:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-6868

Mitre link : CVE-2020-6868

CVE.ORG link : CVE-2020-6868


JSON object : View

Products Affected

zte

  • f680
  • f680_firmware
CWE
CWE-20

Improper Input Validation