Advisory Published
Updated

CVE-2020-6863

First published: Thu Feb 27 2020(Updated: )

ZTE E8820V3 router product is impacted by a permission and access control vulnerability. Attackers could use this vulnerability to tamper with DDNS parameters and send DoS attacks on the specified URL.

Credit: psirt@zte.com.cn

Affected SoftwareAffected VersionHow to fix
ZTE E8820v3 Firmware<3.1.0.1000.5
ZTE E8820v3 Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-6863?

    CVE-2020-6863 is classified as a high severity vulnerability due to its potential for remote exploitation.

  • How do I fix CVE-2020-6863?

    Updating the ZTE E8820V3 firmware to a version later than 3.1.0.1000.5 mitigates the vulnerability.

  • What type of attacks can be performed using CVE-2020-6863?

    Attackers can exploit CVE-2020-6863 to tamper with DDNS parameters and execute Denial of Service (DoS) attacks.

  • Which devices are affected by CVE-2020-6863?

    CVE-2020-6863 affects the ZTE E8820V3 router with specific firmware versions up to 3.1.0.1000.5.

  • What is the nature of the vulnerability in CVE-2020-6863?

    CVE-2020-6863 is a permission and access control vulnerability that allows unauthorized actions on the router.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203