10
CVSSv2

CVE-2015-5995

Published: 31/12/2015 Updated: 31/12/2015
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 and Tenda N3 Wireless N150 devices allow remote malicious users to obtain administrative access via a certain admin substring in an HTTP Cookie header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tenda n3 wireless n150

mediabridge medialink_mwn-wapr300n_firmware

Exploits

# Exploit Title: Complete Authentication Bypass In Tenda N3 Wireless N150 Routers # Date: 03-09-2015 # Software Link: tendacncom/en/product/N150html # Exploit Author: Mandeep Jadon # Contact: twittercom/1337tr0lls # Website: twittercom/1337tr0lls # CVE: CVE-2015-5995 # Category: Device Description: The router (AP) is usi ...

Github Repositories

An exploitation tool to extract passwords using CVE-2015-5995.

TendaSpill An exploitation tool to extract passwords using CVE-2015-5995 CVE-2015-5995 Mediabridge Medialink MWN-WAPR300N devices with firmware 50750 and Tenda N3 Wireless N150 devices allow remote attackers to obtain administrative access via a certain admin substring in an HTTP Cookie header Disclaimer This tool is for testing and educational purposes only Any other usag

An exploitation tool to extract passwords using CVE-2015-5995.

TendaSpill An exploitation tool to extract passwords using CVE-2015-5995 CVE-2015-5995 Mediabridge Medialink MWN-WAPR300N devices with firmware 50750 and Tenda N3 Wireless N150 devices allow remote attackers to obtain administrative access via a certain admin substring in an HTTP Cookie header Disclaimer This tool is for testing and educational purposes only Any other usag