Tenda W20E V16.01.0.6(3392) is vulnerable to Command injection via cmd_get_ping_output.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2 | Exploit Third Party Advisory | 
| https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 07:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2 - Exploit, Third Party Advisory | 
08 Aug 2023, 14:21
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-78 | 
14 Dec 2022, 19:54
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-12-12 16:15
Updated : 2025-04-22 19:15
NVD link : CVE-2022-45996
Mitre link : CVE-2022-45996
CVE.ORG link : CVE-2022-45996
JSON object : View
Products Affected
                tenda
- w15e
 - w20e_firmware
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
