Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-24987 : Vulnerability Insights and Analysis

Learn about CVE-2020-24987, a vulnerability in Tenda AC18 Routers allowing remote code execution. Find out how to mitigate the risk and secure your network.

Tenda AC18 Router through V15.03.05.05_EN and through V15.03.05.19(6318) CN devices could cause a remote code execution due to incorrect authentication handling of vulnerable logincheck() function in /usr/lib/lua/ngx_authserver/ngx_wdas.lua file if the administrator UI Interface is set to "radius".

Understanding CVE-2020-24987

This CVE involves a vulnerability in Tenda AC18 Routers that could lead to remote code execution.

What is CVE-2020-24987?

CVE-2020-24987 is a security vulnerability in Tenda AC18 Routers that allows remote attackers to execute arbitrary code due to improper authentication handling.

The Impact of CVE-2020-24987

The vulnerability could result in unauthorized remote code execution on affected Tenda AC18 Routers, potentially leading to a compromise of the device and the network it is connected to.

Technical Details of CVE-2020-24987

This section provides more in-depth technical information about the CVE.

Vulnerability Description

The vulnerability arises from incorrect authentication handling in the logincheck() function of the /usr/lib/lua/ngx_authserver/ngx_wdas.lua file when the administrator UI Interface is set to "radius" on Tenda AC18 Routers.

Affected Systems and Versions

        Tenda AC18 Routers through V15.03.05.05_EN
        Tenda AC18 Routers through V15.03.05.19(6318) CN

Exploitation Mechanism

Attackers can exploit this vulnerability remotely by manipulating the authentication process through the vulnerable logincheck() function.

Mitigation and Prevention

Protecting systems from CVE-2020-24987 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Disable remote access to the router if not required
        Implement strong, unique passwords for router access
        Monitor network traffic for any suspicious activity

Long-Term Security Practices

        Regularly update router firmware to the latest version
        Conduct security assessments and penetration testing on the network

Patching and Updates

        Check for firmware updates from Tenda and apply them promptly to address the vulnerability

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now