Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| http://u-speed.com |
|
| https://github.com/kirubel-cve/CVE-2026-36959 |
|
Tue, 05 May 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
U-speed n300
U-speed n300 Firmware |
|
| CPEs | cpe:2.3:h:u-speed:n300:-:*:*:*:*:*:*:* cpe:2.3:o:u-speed:n300_firmware:1.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
U-speed n300
U-speed n300 Firmware |
Sat, 02 May 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unrestricted Brute‑Force Login on U‑SPEED N300 Router |
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
U-speed
U-speed n300 Router |
|
| Vendors & Products |
U-speed
U-speed n300 Router |
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-307 | |
| Metrics |
cvssV3_1
|
Thu, 30 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | U-SPEED N300 router V1.0.0 does not implement rate limiting or account lockout protections on the /api/login endpoint. This allows an attacker on the local network to perform unlimited authentication attempts, enabling brute-force attacks against the administrator account and potential unauthorized access to the router management interface. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-30T15:49:59.809Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-36959
Updated: 2026-04-30T15:47:36.210Z
Status : Analyzed
Published: 2026-04-30T15:16:23.077
Modified: 2026-05-05T03:00:23.803
Link: CVE-2026-36959
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:45:30Z