This input validation vulnerability allows an attacker to bypass front-end length restrictions on WAN connection names. By using an HTTP proxy to intercept and modify requests, an attacker can tamper with parameter values. This flaw specifically affects version V9.0.10P1N6 .
The most significant security issues identified for the ZTE F680 include:
Attackers could modify critical WAN settings or routing rules.