Advisories

Tenda F3 Plaintext Credential Exposure in Configuration Download

Go Back
severity
high
date
Affecting
  • Tenda F3 <= 12.01.01.55_multi

  • An affected version range remains undefined

CWE
  • CWE-201: Insertion of Sensitive Information Into Sent Data
  • CWE-525: Use of Web Browser Cache Containing Sensitive Information
CVSS
7.1
CVSS V4 Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Credit
Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc.
Description
Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password in plaintext. The endpoint also omits appropriate Cache-Control directives, which can allow the response to be stored in client-side caches and recovered by other local users or processes with access to cached browser data.

Ready to get Started?

Explore VulnCheck, a next-generation Cyber Threat Intelligence platform, which provides exploit and vulnerability intelligence to help you prioritize and remediate vulnerabilities that matter.
  • Vulnerability Prioritization
    Prioritize vulnerabilities that matter based on the threat landscape and defer vulnerabilities that don't.
  • Early Warning System
    Real-time alerting of changes in the vulnerability landscape so that you can take action before the attacks start.