First published: Fri Sep 04 2020(Updated: )
Tenda AC18 Router through V15.03.05.05_EN and through V15.03.05.19(6318) CN devices could cause a remote code execution due to incorrect authentication handling of vulnerable logincheck() function in /usr/lib/lua/ngx_authserver/ngx_wdas.lua file if the administrator UI Interface is set to "radius".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac18 Firmware | <=v15.03.05.05_en | |
Tendacn Ac18 | ||
Tendacn Ac18 Firmware | <=v15.03.05.19\(6318\)_cn |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24987 refers to a vulnerability found in Tenda AC18 routers which could allow remote code execution due to incorrect authentication handling.
CVE-2020-24987 has a severity rating of 9.8 (Critical).
CVE-2020-24987 affects Tenda AC18 routers running firmware versions up to v15.03.05.05_EN and v15.03.05.19(6318)_cn.
The CVE-2020-24987 vulnerability can be exploited by exploiting the incorrect authentication handling in the vulnerable logincheck() function.
It is recommended to update the firmware of the Tenda AC18 router to the latest version provided by the vendor to fix the CVE-2020-24987 vulnerability.