First published: Tue Aug 30 2022(Updated: )
Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains a vulnerability which allows attackers to remove the Wi-Fi password and force the device into open security mode via a crafted packet sent to goform/setWizard.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac6 Firmware | <=02.03.01.114 | |
Tendacn Ac6 | =5.0 | |
All of | ||
Tendacn Ac6 Firmware | <=02.03.01.114 | |
Tendacn Ac6 | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37176 is a vulnerability in Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below that allows attackers to remove the Wi-Fi password and force the device into open security mode.
The severity of CVE-2022-37176 is critical with a CVSS score of 9.8.
CVE-2022-37176 allows attackers to remove the Wi-Fi password and force the device into open security mode by sending a crafted packet to goform/setWizard.
Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below are affected by CVE-2022-37176.
To fix CVE-2022-37176, it is recommended to update Tenda AC6(AC1200) firmware to a version that is not affected.