A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
Link | Tags |
---|---|
https://vuldb.com/?id.320359 | third party advisory vdb entry |
https://vuldb.com/?ctiid.320359 | vdb entry signature permissions required |
https://vuldb.com/?submit.632268 | third party advisory vdb entry |
https://github.com/ZZ2266/.github.io/tree/main/AC20/hardcoded%20password/readme.md | third party advisory exploit related |
https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description | third party advisory exploit |
https://www.tenda.com.cn/ | product |
https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md | exploit third party advisory |