Description
Some ZTE devices have input verification vulnerabilities. The devices support configuring a static prefix through the web management page. The restriction of the front-end code can be bypassed by constructing a POST request message and sending the request to the creation of a static routing rule configuration interface. The WEB service backend fails to effectively verify the abnormal input. As a result, the attacker can successfully use the vulnerability to tamper parameter values. This affects: ZXHN Z500 V1.0.0.2B1.1000 and ZXHN F670L V1.1.10P1N2E. This is fixed in ZXHN Z500 V1.0.1.1B1.1000 and ZXHN F670L V1.1.10P2N2.
Published: 2020-11-19
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-28021 Some ZTE devices have input verification vulnerabilities. The devices support configuring a static prefix through the web management page. The restriction of the front-end code can be bypassed by constructing a POST request message and sending the request to the creation of a static routing rule configuration interface. The WEB service backend fails to effectively verify the abnormal input. As a result, the attacker can successfully use the vulnerability to tamper parameter values. This affects: ZXHN Z500 V1.0.0.2B1.1000 and ZXHN F670L V1.1.10P1N2E. This is fixed in ZXHN Z500 V1.0.1.1B1.1000 and ZXHN F670L V1.1.10P2N2.
History

No history.

Subscriptions

Zte Zxhn F670l Zxhn F670l Firmware Zxhn Z500 Zxhn Z500 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: zte

Published:

Updated: 2024-08-04T09:11:05.146Z

Reserved: 2020-01-13T00:00:00.000Z

Link: CVE-2020-6879

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-19T17:15:13.420

Modified: 2024-11-21T05:36:20.513

Link: CVE-2020-6879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses