Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-14100
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Xiaomi router R3600 ROM version<1.0.66, filters in the set_WAN6 interface can be bypassed, causing remote code execution. The router administrator can gain root access from this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
小米路由器 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xiaomi Mi Router是中国小米科技(Xiaomi)公司的一款无线路由器。 小米路由器R3600 ROM 1.0.66版本之前存在安全漏洞,该漏洞源于set WAN6接口中的过滤器可以被绕过,导致远程代码执行。路由器管理员可以通过这个漏洞获得root访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-Xiaomi router R3600 ROM version<1.0.66,fixed:Upgrade ROM Version =1.0.66 -
II. Public POCs for CVE-2020-14100
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-14100
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-14100

No comments yet


Leave a comment