The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account.
References
Link | Resource |
---|---|
https://boschko.ca/tenda_ac1200_router/ | Exploit Technical Description Third Party Advisory |
https://boschko.ca/tenda_ac1200_router/ | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://boschko.ca/tenda_ac1200_router/ - Exploit, Technical Description, Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-11-15 02:15
Updated : 2024-11-21 07:22
NVD link : CVE-2022-40843
Mitre link : CVE-2022-40843
CVE.ORG link : CVE-2022-40843
JSON object : View
Products Affected
tenda
- ac1200_v-w15ev2
- w15e_firmware
CWE