There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface
History

Fri, 15 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Aug 2025 10:45:00 +0000

Type Values Removed Values Added
Description There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface
Title Unauthorized Access Vulnerability in ZTE F50
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zte

Published: 2025-08-15T10:35:22.604Z

Updated: 2025-08-15T11:48:24.285Z

Reserved: 2025-02-14T06:13:41.901Z

Link: CVE-2025-26709

cve-icon Vulnrichment

Updated: 2025-08-15T11:48:17.921Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-15T11:15:28.720

Modified: 2025-08-15T13:12:51.217

Link: CVE-2025-26709

cve-icon Redhat

No data.