Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-6879

EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-6879

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Some ZTE devices have input verification vulnerabilities. The devices support configuring a static prefix through the web management page. The restriction of the front-end code can be bypassed by constructing a POST request message and sending the request to the creation of a static routing rule configuration interface. The WEB service backend fails to effectively verify the abnormal input. As a result, the attacker can successfully use the vulnerability to tamper parameter values. This affects: ZXHN Z500 V1.0.0.2B1.1000 and ZXHN F670L V1.1.10P1N2E. This is fixed in ZXHN Z500 V1.0.1.1B1.1000 and ZXHN F670L V1.1.10P2N2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ZTE ZXHN F670和ZTE ZXHN H108N 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ZTE ZXHN F670和ZTE ZXHN H108N都是中国中兴通讯(ZTE)公司的一款调制解调器。 部分中兴设备存在输入验证错误漏洞,该漏洞源于这些设备支持通过web管理页面配置静态前缀。通过构造POST请求消息并将请求发送到静态路由规则配置接口的创建中,可以绕过前端代码的限制。WEB服务后端无法有效地验证异常输入。攻击者可利用该漏洞可以成功利用该漏洞篡改参数值。以下产品及版本受到影响:ZXHN Z500 V1.0.0.2B1.1000,ZXHN F670L V1.1.10P1N2E, ZXHN Z
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-ZXHN Z500 Affects: V1.0.0.2B1.1000 -
-ZXHN F670L Affects: V1.1.10P1N2E -

II. Public POCs for CVE-2020-6879

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-6879

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-11-19 · 54 CVEs total

CVE-2020-28942PrimeKey Solutions PrimeKey EJBCA 信任管理问题漏洞
CVE-2020-25699Moodle 访问控制错误漏洞
CVE-2020-28054TSMManager Collector 信息泄露漏洞
CVE-2020-8279Nextcloud 信任管理问题漏洞
CVE-2020-8278Nextcloud Social app 访问控制错误漏洞
CVE-2019-20933Influxdata InfluxDB 授权问题漏洞
CVE-2020-5947F5 BIG-IP 安全漏洞
CVE-2020-25703Moodle 信息泄露漏洞
CVE-2020-25702Moodle 跨站脚本漏洞
CVE-2020-25700Moodle SQL注入漏洞
CVE-2020-25701Moodle 访问控制错误漏洞
CVE-2020-28947MISP 跨站脚本漏洞
CVE-2020-22394YzmCMS 跨站脚本漏洞
CVE-2020-28949Pear Archive_Tar 注入漏洞
CVE-2020-28948Pear Archive_Tar 代码问题漏洞
CVE-2020-28951OpenWrt 资源管理错误漏洞
CVE-2020-28924Rclone 安全特征问题漏洞
CVE-2020-28350Sokrates SOWA SowaSQL 跨站脚本漏洞
CVE-2020-25989Pritunl-client 后置链接漏洞
CVE-2020-28210Schneider Electric EcoStruxure Building Operation WebStation 跨站脚本漏洞

Showing top 20 of 54 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-6879

No comments yet


Leave a comment