CVE-2020-6879

Description

Some ZTE devices have input verification vulnerabilities. The devices support configuring a static prefix through the web management page. The restriction of the front-end code can be bypassed by constructing a POST request message and sending the request to the creation of a static routing rule configuration interface. The WEB service backend fails to effectively verify the abnormal input. As a result, the attacker can successfully use the vulnerability to tamper parameter values. This affects: ZXHN Z500 V1.0.0.2B1.1000 and ZXHN F670L V1.1.10P1N2E. This is fixed in ZXHN Z500 V1.0.1.1B1.1000 and ZXHN F670L V1.1.10P2N2.

Category

3.5
CVSS
Severity: Low
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.14%
Vendor Advisory com.cn
Affected: n/a ZXHN Z500
Affected: n/a ZXHN F670L
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-6879?
CVE-2020-6879 has been scored as a low severity vulnerability.
How to fix CVE-2020-6879?
To fix CVE-2020-6879, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-6879 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-6879 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-6879?
CVE-2020-6879 affects n/a ZXHN Z500, n/a ZXHN F670L.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.