Impact
A crafted request to the router's web interface can return the administrator password and WLAN pre‑shared key, allowing an attacker to bypass authentication and gain full control of the device and the local network. The resulting compromise threatens confidentiality, integrity, and availability of the connected systems.
Affected Systems
ZTE routers, specifically the ZXHN H298A firmware 1.1 and the H108N firmware 2.6, are affected. Firmware builds in these series may also leak partial identifiers such as serial numbers, ESSIDs, and MAC addresses.
Risk and Exploitability
Based on the description, it is inferred that the vulnerability is exploitable remotely over the router's management interface, so an attacker with network reach to the device can initiate the exploit. No CVSS score is available, but no EPSS value is published. The issue is not listed in the CISA KEV catalog. Because the vulnerability directly leaks privileged credentials, the risk of exploitation remains significant.
OpenCVE Enrichment