{"api_version":"1","generated_at":"2026-04-23T09:51:55+00:00","cve":"CVE-2020-14140","urls":{"html":"https://cve.report/CVE-2020-14140","api":"https://cve.report/api/cve/CVE-2020-14140.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-14140","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-14140"},"summary":{"title":"CVE-2020-14140","description":"When Xiaomi router firmware is updated in 2020, there is an unauthenticated API that can reveal WIFI password vulnerability. This vulnerability is caused by the lack of access control policies on some API interfaces. Attackers can exploit this vulnerability to enter the background and execute background command injection.","state":"PUBLIC","assigner":"security@xiaomi.com","published_at":"2023-03-29 20:15:00","updated_at":"2023-04-06 17:48:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=506","name":"https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=506","refsource":"MISC","tags":[],"title":"产品安全中心","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-14140","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14140","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"14140","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mi","cpe5":"xiaomi_router_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-14140","ASSIGNER":"security@xiaomi.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Xiaomi Multiple Devices","version":{"version_data":[{"version_value":"Xiaomi Multiple Devices, firmware update time in 2020-2022"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Unauthenticated API that can reveal WIFI password vulnerability"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=506","url":"https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=506"}]},"description":{"description_data":[{"lang":"eng","value":"When Xiaomi router firmware is updated in 2020, there is an unauthenticated API that can reveal WIFI password vulnerability. This vulnerability is caused by the lack of access control policies on some API interfaces. Attackers can exploit this vulnerability to enter the background and execute background command injection."}]}},"nvd":{"publishedDate":"2023-03-29 20:15:00","lastModifiedDate":"2023-04-06 17:48:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mi:xiaomi_router_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2020","versionEndExcluding":"2023.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"14140","Ordinal":"175366","Title":"CVE-2020-14140","CVE":"CVE-2020-14140","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"14140","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}