Unknown
CVE-2020-6872
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-6872
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The server management software module of ZTE has a storage XSS vulnerability. The attacker inserts some attack codes through the foreground login page, which will cause the user to execute the predefined malicious script in the browser. This affects <R5300G4V03.08.0100/V03.07.0300/V03.07.0200/V03.07.0108/V03.07.0100/V03.05.0047/V03.05.0046/V03.05.0045/V03.05.0044/V03.05.0043/V03.05.0040/V03.04.0020;R8500G4V03.07.0103/V03.07.0101/V03.06.0100/V03.05.0400/V03.05.0020;R5500G4V03.08.0100/V03.07.0200/V03.07.0100/V03.06.0100>
.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- r5300g4 firmware 03.04.0020,
- r5300g4 firmware 03.05.0040,
- r5300g4 firmware 03.05.0043,
- r5300g4 firmware 03.05.0044,
- r5300g4 firmware 03.05.0045,
- r5300g4 firmware 03.05.0046,
- r5300g4 firmware 03.05.0047,
- r5300g4 firmware 03.07.0100,
- r5300g4 firmware 03.07.0108,
- r5300g4 firmware 03.07.0200,
- r5300g4 firmware 03.07.0300,
- r5300g4 firmware 03.08.0100,
- r5500g4 firmware 03.06.0100,
- r5500g4 firmware 03.07.0100,
- r5500g4 firmware 03.07.0200,
- r5500g4 firmware 03.08.0100,
- r8500g4 firmware 03.05.0020,
- r8500g4 firmware 03.05.0400,
- r8500g4 firmware 03.06.0100,
- r8500g4 firmware 03.07.0101,
- r8500g4 firmware 03.07.0103
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: