First published: Fri Feb 11 2022(Updated: )
A vulnerability was discovered in Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN which allows for remote code execution via shell metacharacters in the guestuser field to the __fastcall function with a POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac9 Firmware | =15.03.06.42_multi | |
Tenda AC9 | =3.0 | |
Tenda Ac9 Firmware | =15.03.05.19\(6318\)_cn | |
Tenda AC9 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-26728 is critical with a CVSS score of 9.8.
CVE-2020-26728 is a vulnerability in Tenda AC9 routers that allows for remote code execution via shell metacharacters in the guestuser field.
Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN are affected by CVE-2020-26728.
Remote code execution can be achieved in CVE-2020-26728 by exploiting shell metacharacters in the guestuser field through a POST request.
No, Tenda AC9 versions 3.0 and 1.0 are not vulnerable to CVE-2020-26728.