tenda AC6 Security Vulnerabilities

9 Vulnerabilities
Description

On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, a large HTTP POST request sent to the change password API will trigger the router to crash and enter an infinite boot loop.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-28095, Last Modified: 2020-12-30T21:24:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, admin, support, user, and nobody have a password of 1234.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-28093, Last Modified: 2020-12-28T07:15:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, the default settings for the router speed test contain links to download malware named elive or CNKI E-Learning.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-28094, Last Modified: 2020-12-28T07:15:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/openSchedWifi schedStartTime and schedEndTime parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13389, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/addressNat entrys and mitInterface parameters for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13390, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetSpeedWan speed_dir parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13391, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/setcfm funcpara1 parameter for a POST request, a value is directly used in a sprintf to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13392, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/saveParentControlInfo deviceId and time parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13393, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup

An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/SetNetControlList list parameter for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.

Impacted versions: -

Base Score: 0.0, Severity: NA, ID: CVE-2020-13394, Last Modified: 2020-05-22T17:36:00Z

References

Advisory

Modemly Security Checklist

Tenda-AC6-router-setup
Free Home-Networking Courses, tutorials and security checklists

USAGE: Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.