Statement of Vulnerability in ZTE MF910S Product

Original release date: 5 November 2019
Update date:28 November 2019 





CVSS 3.0 Base Score

5.9 Medium (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)



In October 2019, ZTE PSIRT received an report about Information leakage vulnerability on MF910S.

Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage.

The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security.



Thanks to Sec Consult Security Lab and security researcher Shen Ying for providing security issues to ZTE PSIRT.


Update Records

5 November, 2019, initial.

28 November, 2019, update,Removed security research lab and security researcher from the Statement. 


Supporting team contacts

1. ZTE GCSC hotline:




2. Product forum at ZTE Support website.



If you need to feedback or report security vulnerabilities related to ZTE products, or get ZTE product security incident response service and vulnerability information, please contact ZTE PSIRT:, PGP key ID: FF095577.