A vulnerability was discovered in Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN which allows for remote code execution via shell metacharacters in the guestuser field to the __fastcall function with a POST request.
References
Link | Resource |
---|---|
https://github.com/Lyc-heng/Router/blob/main/Tenda/rce1.md | Broken Link |
https://github.com/Lyc-heng/routers/blob/a80b30bccfc9b76f3a4868ff28ad5ce2e0fca180/routers/rce1.md | Exploit Third Party Advisory |
https://github.com/Lyc-heng/routers/blob/main/routers/rce1.md | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-02-11T18:05:36
Updated: 2022-02-17T13:58:54
Reserved: 2020-10-07T00:00:00
Link: CVE-2020-26728
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-11T19:15:08.027
Modified: 2022-02-22T18:03:21.923
Link: CVE-2020-26728
JSON object: View
Redhat Information
No data.
CWE