First published: Mon Dec 21 2020(Updated: )
ZTE E8810/E8820/E8822 series routers have an information leak vulnerability, which is caused by hard-coded MQTT service access credentials on the device. The remote attacker could use this credential to connect to the MQTT server, so as to obtain information about other devices by sending specific topics. This affects:<ZXHN E8810, ZXHN E8820, ZXHN E8822><E8810 V1.0.26, E8810 V2.0.1, E8820 V1.1.3L, E8820 V2.0.13, E8822 V2.0.13>
Credit: psirt@zte.com.cn
Affected Software | Affected Version | How to fix |
---|---|---|
Zte Zxhn E8810 Firmware | =1.0.26 | |
Zte Zxhn E8810 Firmware | =2.0.1 | |
Zte Zxhn E8810 | ||
Zte Zxhn E8820 Firmware | =1.1.3 | |
Zte Zxhn E8820 Firmware | =2.0.13 | |
Zte Zxhn E8820 | ||
Zte Zxhn E8822 Firmware | =2.0.13 | |
Zte Zxhn E8822 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-6882.
The severity of CVE-2020-6882 is high with a CVSS score of 7.5.
CVE-2020-6882 allows a remote attacker to obtain information about other devices connected to the router.
The affected software for CVE-2020-6882 includes ZTE ZXHN E8810 Firmware versions 1.0.26 and 2.0.1, ZTE ZXHN E8820 Firmware versions 1.1.3 and 2.0.13, and ZTE ZXHN E8822 Firmware version 2.0.13.
To fix CVE-2020-6882, ZTE has released firmware updates containing the necessary security patches. It is recommended to update to the latest firmware version provided by ZTE.