{ "Name": "Tenda AC15 1900 telnet 后门", "Description": "

Tenda AC15 AC1900 是中国腾达(Tenda)公司的一款无线路由器。

Tenda AC15 1900 存在 telnet 后门漏洞,远程攻击者可借助该后门任意系统命令。

", "Product": "Tenda AC15 1900", "Homepage": "https://www.tenda.com.cn/default.html", "DisclosureDate": "2022-04-11", "Author": "992271865@qq.com", "FofaQuery": "title=\"Tenda Web Master\"", "GobyQuery": "title=\"Tenda Web Master\"", "Level": "3", "Impact": "

Tenda AC15 1900 存在 telnet 后门漏洞,远程攻击者可借助该后门任意系统命令。

", "Recommendation": "

厂商暂未提供修复方案,请关注厂商网站及时更新: https://www.tenda.com.cn

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

", "Translation": { "CN": { "Name": "Tenda AC15 1900 telnet 后门", "Product": "Tenda AC15 1900", "Description": "

Tenda AC15 AC1900 是中国腾达(Tenda)公司的一款无线路由器。

Tenda AC15 1900 存在 telnet 后门漏洞,远程攻击者可借助该后门任意系统命令。

", "Recommendation": "

厂商暂未提供修复方案,请关注厂商网站及时更新: https://www.tenda.com.cn

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

", "Impact": "

Tenda AC15 1900 存在 telnet 后门漏洞,远程攻击者可借助该后门任意系统命令。

", "VulType": [ "后门" ], "Tags": [ "后门" ] }, "EN": { "Name": "Tenda AC15 1900 telnet backdoor", "Product": "Tenda AC15 1900", "Description": "

Tenda AC15 AC1900 is a wireless router from China Tenda Company.

Tenda AC15 1900 has a telnet backdoor vulnerability, which allows remote attackers to use the backdoor to execute arbitrary system commands.

", "Recommendation": "

There is currently no detailed solution provided, please pay attention to the manufacturer's homepage update: https://www.tenda.com.cn

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

", "Impact": "

Tenda AC15 1900 has a telnet backdoor vulnerability, which allows remote attackers to use the backdoor to execute arbitrary system commands.

", "VulType": [ "backdoor" ], "Tags": [ "backdoor" ] } }, "References": [ "https://fofa.so" ], "HasExp": true, "ExpParams": [ { "name": "cmd", "type": "input", "value": "ls" } ], "ExpTips": null, "ScanSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [] } ], "Tags": [ "后门" ], "VulType": [ "后门" ], "CVEIDs": [ "" ], "CVSSScore": "9.8", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null }, "CNNVD": [ "" ], "CNVD": [ "" ], "ExploitSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [] } ] }