dumitory-dev / CVE-2020-35391-POC

Tenda N300 Authentication Bypass via Malformed HTTP Request Header

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Welcome to CVE-2020-35391-POC πŸ‘‹

Original Documentation License: MIT Pylint

Tenda N300 Authentication Bypass via Malformed HTTP Request Header Python POC

Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.

Original PoC Author: Michelle Bonilla
After so much time since this CVE was published, the vulnerability has still not been fixed! (Last Firmware Version: V12.01.01.42_multi)

Usage

python3 main.py <router ip>

Work example

Author

πŸ‘€ dumitory-dev

Show your support

Give a ⭐️ if this project helped you!

πŸ“ License

This project is MIT licensed.

About

Tenda N300 Authentication Bypass via Malformed HTTP Request Header

License:MIT License


Languages

Language:Python 100.0%