First published: Mon May 01 2023(Updated: )
Cleartext Transmission in set-cookie:ecos_pw: Tenda N301 v6.0, Firmware v12.02.01.61_multi allows an authenticated attacker on the LAN or WLAN to intercept communications with the router and obtain the password.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda N301 | =12.03.01.06_pt | |
Tenda N301 Firmware | =6.0 | |
Tenda N301 | =12.03.01.06_pt | |
Tenda N301 Firmware | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29680 has a moderate severity level due to the potential for an authenticated attacker to intercept sensitive information.
To mitigate CVE-2023-29680, update the Tenda N301 firmware to the latest version as recommended by the vendor.
CVE-2023-29680 affects Tenda N301 routers running firmware version 12.03.01.06_pt.
The impact of CVE-2023-29680 allows attackers to intercept communications and obtain the router's password.
No, CVE-2023-29680 requires the attacker to be authenticated on the local LAN or WLAN to exploit the vulnerability.