CVE-2020-35296

ThinkAdmin v6 has default administrator credentials, which allows attackers to gain unrestricted administratior dashboard access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () https://smshrimant.com/admin-panel-access-using-default-credentials/ - Exploit, Third Party Advisory () https://smshrimant.com/admin-panel-access-using-default-credentials/ - Exploit, Third Party Advisory, URL Repurposed

07 Dec 2023, 14:22

Type Values Removed Values Added
First Time Thinkadmin
Thinkadmin thinkadmin
CPE cpe:2.3:a:ctolog:thinkadmin:6.0:*:*:*:*:*:*:* cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:*

09 Mar 2021, 19:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:ctolog:thinkadmin:6.0:*:*:*:*:*:*:*
CWE CWE-798
References (MISC) https://smshrimant.com/admin-panel-access-using-default-credentials/ - (MISC) https://smshrimant.com/admin-panel-access-using-default-credentials/ - Exploit, Third Party Advisory
References (MISC) https://github.com/zoujingli/ThinkAdmin - (MISC) https://github.com/zoujingli/ThinkAdmin - Product
References (MISC) https://github.com/Shrimant12/CVE-References/blob/main/CVE-2020-35296.md - (MISC) https://github.com/Shrimant12/CVE-References/blob/main/CVE-2020-35296.md - Exploit, Third Party Advisory

03 Mar 2021, 16:58

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-03 16:15

Updated : 2024-02-14 01:17


NVD link : CVE-2020-35296

Mitre link : CVE-2020-35296

CVE.ORG link : CVE-2020-35296


JSON object : View

Products Affected

thinkadmin

  • thinkadmin
CWE
CWE-798

Use of Hard-coded Credentials