An attacker can inject arbitrary code in the router interface and cause a denial-of-service condition or even full system takeover.

The Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi routers also have a hardcoded password of ‘admin’, which makes it easier for an attacker to gain remote access.

An attacker can also easily set up a man-in-the-middle attack to capture sensitive information and perform other malicious activities.

Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi routers are prone to a remote code execution vulnerability at /cgi-bin/expandDlnaFile. An attacker can exploit this vulnerability to execute arbitrary commands with root privileges on the device.

Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi routers are also vulnerable to a reflected cross-site scripting vulnerability at /cgi-bin/expandDlnaFile. An attacker can exploit this vulnerability to perform various actions on the device of the user running the vulnerable application, such as stealing user data or performing a Man-in-the-middle attack.

Patients using Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi routers are advised to upgrade these devices

Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi router summary

The Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi routers are prone to a remote code execution vulnerability at /cgi-bin/expandDlnaFile which could allow an attacker to perform actions on the device of the user running the vulnerable application, such as stealing user data or performing a Man-in-the-middle attack.
Patients using Tenda V15.03.05.19_multi and AC18 V15.03.05.19_multi routers are advised to upgrade these devices

Tenda V15.03.05.19_multi Router Vulnerability

A remote code execution vulnerability that can be exploited to execute arbitrary commands with root privileges on the device.
The Tenda V15.03.05.19_multi router is vulnerable to a reflected cross-site scripting vulnerability at /cgi-bin/expandDlnaFile that can be exploited to perform various actions on the device of the user running the vulnerable application, such as stealing user data or performing a Man-in-the-middle attack.

Timeline

Published on: 09/15/2022 20:15:00 UTC
Last modified on: 09/19/2022 17:59:00 UTC

References