Vulnerability Description
Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | F3 Firmware | 12.01.01.48 |
| Tenda | F3 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171773/Tenda-N300-F3-12.01.01.48-Header-Pro
- https://medium.com/%40signalhilltech/tenda-n300-authentication-bypass-via-malfor
- http://packetstormsecurity.com/files/171773/Tenda-N300-F3-12.01.01.48-Header-Pro
- https://medium.com/%40signalhilltech/tenda-n300-authentication-bypass-via-malfor
FAQ
What is CVE-2020-35391?
CVE-2020-35391 is a vulnerability with a CVSS score of 9.6 (CRITICAL). Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related ...
How severe is CVE-2020-35391?
CVE-2020-35391 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-35391?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda F3 Firmware, Tenda F3.