CVE-2020-6879
Summary
| CVE | CVE-2020-6879 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-11-19 17:15:00 UTC |
| Updated | 2020-12-02 21:13:00 UTC |
| Description | Some ZTE devices have input verification vulnerabilities. The devices support configuring a static prefix through the web management page. The restriction of the front-end code can be bypassed by constructing a POST request message and sending the request to the creation of a static routing rule configuration interface. The WEB service backend fails to effectively verify the abnormal input. As a result, the attacker can successfully use the vulnerability to tamper parameter values. This affects: ZXHN Z500 V1.0.0.2B1.1000 and ZXHN F670L V1.1.10P1N2E. This is fixed in ZXHN Z500 V1.0.1.1B1.1000 and ZXHN F670L V1.1.10P2N2. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Zte | Zxhn F670l | - | All | All | All |
| Hardware | Zte | Zxhn F670l | - | All | All | All |
| Operating System | Zte | Zxhn F670l Firmware | v1.1.10p1n2e | All | All | All |
| Operating System | Zte | Zxhn F670l Firmware | v1.1.10p1n2e | All | All | All |
| Hardware | Zte | Zxhn Z500 | - | All | All | All |
| Hardware | Zte | Zxhn Z500 | - | All | All | All |
| Operating System | Zte | Zxhn Z500 Firmware | v1.0.0.2b1.1000 | All | All | All |
| Operating System | Zte | Zxhn Z500 Firmware | v1.0.0.2b1.1000 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Bulletin Details | MISC | support.zte.com.cn | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.