A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit has been made public and could be used.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
Link | Tags |
---|---|
https://vuldb.com/?id.320914 | vdb entry third party advisory |
https://vuldb.com/?ctiid.320914 | vdb entry signature permissions required |
https://vuldb.com/?submit.633585 | vdb entry third party advisory |
https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md | exploit third party advisory related |
https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md#steps-to-reproduce | exploit third party advisory |
https://www.tenda.com.cn/ | product |