Tenda N300 Authentication Bypass via Malformed HTTP Request Header<h1 align="center">Welcome to CVE-2020-35391-POC 👋</h1>
<p>
<a href="https://signalhilltech.medium.com/tenda-malformed-http-request-header-processing-vulnerability-ade4b3cdefb4" target="_blank">
<img alt="Original Documentation" src="https://img.shields.io/badge/documentation-yes-brightgreen.svg" />
</a>
<a href="https://mit-license.org/" target="_blank">
<img alt="License: MIT" src="https://img.shields.io/badge/License-MIT-yellow.svg" />
</a>
<a href="https://github.com/dumitory-dev/CVE-2020-35391-POC/actions/workflows/pylint.yml" target="_blank">
<img alt="Pylint" src="https://github.com/dumitory-dev/CVE-2020-35391-POC/actions/workflows/pylint.yml/badge.svg" />
</a>
</p>
Tenda N300 Authentication Bypass via Malformed HTTP Request Header Python POC
<br>
<br>
Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.
<br>
<br>
***Original PoC Author: Michelle Bonilla***
<br>
After so much time since this CVE was published, the vulnerability has still not been fixed! (Last Firmware Version: V12.01.01.42_multi)
## Usage
```sh
python3 main.py <router ip>
```
## Work example
<img src="./img/work.gif" width="650" height="350" />
## Author
👤 **dumitory-dev**
## Show your support
Give a ⭐️ if this project helped you!
## 📝 License
This project is [MIT](https://mit-license.org/) licensed.
[4.0K] /data/pocs/d3990b1ae8710a114f8688b36fe2724cc77dcfe9
├── [4.0K] img
│ └── [239K] work.gif
├── [1.0K] LICENSE
├── [2.3K] main.py
└── [1.7K] README.md
1 directory, 4 files