Vulnerability Description
A ZXELINK wireless controller has a SQL injection vulnerability. A remote attacker does not need to log in. By sending malicious SQL statements, because the device does not properly filter parameters, successful use can obtain management rights. This affects: ZXV10 W908 all versions before MIPS_A_1022IPV6R3T6P7Y20.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zte | Zxv10 W908 Firmware | < mips_a_1022ipv6r3t6p7y20 |
| Zte | Zxv10 W908 | - |
Related Weaknesses (CWE)
References
- http://www.zxelink.com.cn/website/html/CommonContent.html?classify=news&id=43&meVendor Advisory
- http://www.zxelink.com.cn/website/html/CommonContent.html?classify=news&id=43&meVendor Advisory
FAQ
What is CVE-2020-6880?
CVE-2020-6880 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A ZXELINK wireless controller has a SQL injection vulnerability. A remote attacker does not need to log in. By sending malicious SQL statements, because the device does not properly filter parameters,...
How severe is CVE-2020-6880?
CVE-2020-6880 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-6880?
Check the references section above for vendor advisories and patch information. Affected products include: Zte Zxv10 W908 Firmware, Zte Zxv10 W908.