Directory Traversal vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to read arbitrary files via a cgi-bin/luci/request?op=1&path= URI that uses directory traversal sequences after a /usb/ substring.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/Iolop/Poc/tree/master/Router/Tenda |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:43:59.320Z
Reserved: 2017-11-24T00:00:00
Link: CVE-2017-16936

No data.

Status : Modified
Published: 2017-11-24T07:29:00.350
Modified: 2024-11-21T03:17:16.710
Link: CVE-2017-16936

No data.