The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://boschko.ca/tenda_ac1200_router/ |
![]() ![]() |
History
Mon, 07 Jul 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tenda w15e
|
|
CPEs | cpe:2.3:h:tenda:w15e:2.0:*:*:*:*:*:*:* | |
Vendors & Products |
Tenda ac1200 V-w15ev2
|
Tenda w15e
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T12:28:42.565Z
Reserved: 2022-09-19T00:00:00
Link: CVE-2022-40843

No data.

Status : Analyzed
Published: 2022-11-15T02:15:09.093
Modified: 2025-07-07T18:20:33.157
Link: CVE-2022-40843

No data.

No data.