Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Tenda N300 Authentication Bypass via Malformed HTTP Request Header | https://github.com/dumitory-dev/CVE-2020-35391-POC | POC Details |
| 2 | Tenda f3 Malformed HTTP Request Header Processing Vulnerability. | https://github.com/H454NSec/CVE-2020-35391 | POC Details |
| 3 | A Python tool for exploiting CVE-2020-35391 on Tenda F3 V3 and F3 V4 routers, allowing unauthorized access to config, flash, and syslog files. Automates the process of downloading hidden files from the router. | https://github.com/4d000/Tenda-F3-V4 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet