{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T23:00:19.952","vulnerabilities":[{"cve":{"id":"CVE-2020-6862","sourceIdentifier":"psirt@zte.com.cn","published":"2020-01-17T18:15:13.353","lastModified":"2024-11-21T05:36:18.940","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"V6.0.10P2T2 and V6.0.10P2T5 of F6x2W product are impacted by Information leak vulnerability. Unauthorized users could log in directly to obtain page information without entering a verification code."},{"lang":"es","value":"Las versiones V6.0.10P2T2 y V6.0.10P2T5 del producto F6x2W están afectadas por una vulnerabilidad de filtrado de información. Los usuarios no autorizados pueden iniciar sesión directamente para obtener información de la página sin ingresar un código de verificación."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-669"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:f6x2w_firmware:6.0.10p2t2:*:*:*:*:*:*:*","matchCriteriaId":"8E3AD233-6C0A-402D-864D-A9E448E56E1A"},{"vulnerable":true,"criteria":"cpe:2.3:o:zte:f6x2w_firmware:6.0.10p2t5:*:*:*:*:*:*:*","matchCriteriaId":"3F374CE8-BF2A-4AEB-A4C4-A64A7C999B62"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:f6x2w:-:*:*:*:*:*:*:*","matchCriteriaId":"84BF0419-0123-4876-B427-D814D29B874E"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/159135/ZTE-F602W-CAPTCHA-Bypass.html","source":"psirt@zte.com.cn","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012162","source":"psirt@zte.com.cn","tags":["Vendor Advisory"]},{"url":"http://packetstormsecurity.com/files/159135/ZTE-F602W-CAPTCHA-Bypass.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1012162","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}