First published: Tue Feb 20 2024(Updated: )
An access control issue in /usr/sbin/httpd in Tenda TX9 V1 V22.03.02.54, Tenda AX3 V3 V16.03.12.11, Tenda AX9 V1 V22.03.01.46, and Tenda AX12 V1 V22.03.01.46 allows attackers to bypass authentication on any endpoint via a crafted URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda TX9 Pro Firmware | ||
Tenda AX3 Firmware | ||
Tenda AX9 Firmware | ||
Tenda AX12 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47422 is classified as a critical severity vulnerability due to the potential for unauthorized access.
To fix CVE-2023-47422, update your Tenda device firmware to the latest version provided by the manufacturer.
CVE-2023-47422 allows attackers to bypass authentication, leading to unauthorized access to sensitive endpoints.
CVE-2023-47422 affects Tenda TX9, AX3, AX9, and AX12 models with specific firmware versions.
Yes, CVE-2023-47422 can be exploited remotely via crafted URLs without authentication.