Skip to content

Python script to exploit CVE-2020-35391 on Tenda F3 V3/V4 routers, enabling unauthorized download of configuration, flash, and syslog files.

License

Notifications You must be signed in to change notification settings

4d000/Tenda-F3-V4

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Tenda F3 Router Exploit & File Downloader

This project is a tool for downloading various files from the Tenda F3 router (v3/v4) through an unauthenticated vulnerability (CVE-2020-35391). It allows you to get the configuration file, system log, and flash dump from a vulnerable router.

Overview

The script exploits a vulnerability found in the Tenda F3 router, enabling an attacker to download sensitive files without authentication. Specifically, the following files can be downloaded (I'm working on adding the possibility to change the password):

  • Configuration file RouterCfm.cfg (that contains everything in plain text)
  • System log file RouterSystem.log
  • Flash memory dump RouterFlash.bin
  • Extract the admin username and password from the configuration file

Features

  • Download the configuration file: Fetches the router's configuration file.
  • Download the system log file: Fetches the router's system log file.
  • Download the flash dump: Dumps the router's flash memory.
  • Extract the admin password: Decodes the base64-encoded password stored in the configuration file.

Requirements

  • Python 3.x
  • socket, optparse and base64 libraries (usually included with Python)

Usage

python3 tendaF3-tool.py --target <target_ip> [options]

Options:

  • -t, --target : Specify the target IP address (required).
  • -c, --config : Download the configuration file (RouterCfm.cfg).
  • -l, --log : Download the system log file (RouterSystem.log).
  • -f, --flash : Download the flash dump (RouterFlash.bin).
  • -p, --password : Extract the admin username and password from the configuration file.

Example of usage:

python3 tendaF3-tool.py -t 192.168.0.1 --config

This will download the configuration file from the target router.

License

This repository is licensed under the MIT License. See the LICENSE file for more information.


Note: This tool is intended for educational purposes only. Please ensure you have proper authorization before testing any network or device.

About

Python script to exploit CVE-2020-35391 on Tenda F3 V3/V4 routers, enabling unauthorized download of configuration, flash, and syslog files.

Topics

Resources

License

Stars

Watchers

Forks

Languages