tenda AC15 Security Vulnerabilities

11 Vulnerabilities
Description

goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-15916, Last Modified: 2020-07-23T18:46:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

A CSRF issue in the /goform/SysToolReboot endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to reboot the device and cause denial of service via a payload hosted by an attacker-controlled web page.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-10986, Last Modified: 2020-07-13T19:21:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-10987, Last Modified: 2020-07-13T19:21:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-10988, Last Modified: 2020-07-13T19:21:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An XSS issue in the /goform/WifiBasicSet endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute malicious payloads via the WifiName POST parameter.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-10989, Last Modified: 2020-07-13T19:21:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/openSchedWifi schedStartTime and schedEndTime parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13389, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/addressNat entrys and mitInterface parameters for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13390, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetSpeedWan speed_dir parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13391, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/setcfm funcpara1 parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13392, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/saveParentControlInfo deviceId and time parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13393, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetNetControlList list parameter for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13394, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC15-router-setup
Free Home-Networking Courses, tutorials and security checklists

USAGE: Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.