A vulnerability, which was classified as problematic, was found in Tenda AC9 15.03.02.13. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://vuldb.com/?id.311673 | vdb entry third party advisory |
https://vuldb.com/?ctiid.311673 | vdb entry permissions required signature |
https://vuldb.com/?submit.592198 | vdb entry third party advisory |
https://vuldb.com/?submit.592199 | vdb entry third party advisory |
https://candle-throne-f75.notion.site/Tenda-AC9-fromSysToolReboot-20adf0aa1185806a9d20ee5c355c08a6?pvs=73 | exploit related third party advisory |
https://candle-throne-f75.notion.site/Tenda-AC9-fromSysToolRestoreSet-20adf0aa11858094a25ae21f9b4203da | exploit third party advisory |
https://www.tenda.com.cn/ | product |