There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zte
Zte f50 |
|
| Vendors & Products |
Zte
Zte f50 |
Fri, 15 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 Aug 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface | |
| Title | Unauthorized Access Vulnerability in ZTE F50 | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zte
Published: 2025-08-15T10:35:22.604Z
Updated: 2025-08-15T11:48:24.285Z
Reserved: 2025-02-14T06:13:41.901Z
Link: CVE-2025-26709
Updated: 2025-08-15T11:48:17.921Z
Status : Awaiting Analysis
Published: 2025-08-15T11:15:28.720
Modified: 2025-08-15T13:12:51.217
Link: CVE-2025-26709
No data.