Description
Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation. Attackers can send GET requests to the /goform/AdvSetDns endpoint with a crafted admin cookie to change DNS servers and redirect user traffic to malicious sites.
Problem types
Authentication Bypass by Spoofing
Product status
References
www.exploit-db.com/exploits/44381 (ExploitDB-44381)
www.vulncheck.com/...8-en-cookie-session-weakness-dns-change (VulnCheck Advisory: Tenda FH303/A300 V5.07.68_EN Cookie Session Weakness DNS Change)