Vulnerabilites related to huawei - hirouter-cd30-10_firmware
Vulnerability from fkie_nvd
Published
2019-11-29 21:15
Modified
2024-11-21 04:44
Severity ?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D1F115-4B8D-498E-A1C0-FB2A99D86314", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FC9A3-B7E5-4AC8-8335-1FE9F434A75B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "693353FE-21A4-4A20-B84B-88CD5A94E7C9", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "10.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F39EBBE2-02F4-49C9-A37E-1A8055A7A29E", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3D1A03-BF26-49EF-818F-E2605BCE7CA9", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EB8D0D-664A-4328-A340-B800D4C4F82F", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "F50D5403-BDD7-4733-8EB2-AF960998EC29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D65D593-3B3C-454F-B03D-EA098A66A8D7", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F964D58-E5DC-459F-8BAE-DC64611C0B1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AE1D8B1-E2E7-430E-892E-8B0CF866E324", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "24346A08-F63F-4C1C-9C56-C38CFE951319", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E14134F5-65F9-4AA6-B0B0-D0BB29DD236A", "versionEndExcluding": "10.0.2.9", "versionStartIncluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749DBE68-7829-4C8C-8E77-A318A6C069E9", "versionEndExcluding": "10.0.2.9", "versionStartIncluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A60FDB8-D441-4758-8039-EC72D82129F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23F869F-205E-4A16-8F39-D2ADE2FC0110", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF176F6-C4F5-42C4-8062-944BE659B676", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7964BB3B-2879-42EB-BFC9-88DA80810424", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "10.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "677940C5-A53E-400C-A1B1-3AD9E7A5D8A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A5784B9-75DB-4B3C-A39C-BA5981FE59E8", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "9.0.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9047E74D-FCB4-4AC9-AFD4-4671EA894C01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB327892-DEFF-46E6-8455-BC46BA9A3618", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D7CF494-9BFA-4285-B605-F71038D43F3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "680447F5-F22A-4CB7-82B2-592F2ABDF1BB", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB016862-3469-4CD9-BAE5-5E402FEB6F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A92FF02-EDC8-4CA7-B73A-F2EDF16F19FC", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEEABBD3-61FF-4153-8A74-6EDAAF8139FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D2C5040-4164-4AD5-990C-D0BDBB603CDB", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ABF0A04-286D-41DE-BA82-849C05C8AF28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFD3E480-43D6-4C4C-B87A-D30A4B22A57B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D35B3544-C774-40CD-A1F0-809DE8CAE106", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7EAA3A7-B89D-4590-9052-B54725494E71", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EBF21E5-8CF6-48DA-80ED-58AE59CDA069", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF2E5FB0-A4E7-49D1-A599-10FB1546EC70", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E769E6-D560-4E9F-9AC6-93744DAAF051", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7A7D72-7B25-44B6-9104-E1C246A87794", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "10.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B459C5EE-1F5A-4E23-89CE-E52E8FBB5926", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB0E9103-6DDF-4140-8C60-39B667B982D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDF101FC-6BD1-48E5-8ADB-B6B9C29F08AE", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "F771D83F-8EBA-47E9-9260-C49605EEBCEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories." }, { "lang": "es", "value": "Algunos enrutadores dom\u00e9sticos de Huawei presentan una vulnerabilidad de comprobaci\u00f3n de entrada. Debido a que el par\u00e1metro de entrada no es verificado correctamente, un atacante puede explotar esta vulnerabilidad mediante el env\u00edo de paquetes especiales construidos para obtener archivos en el dispositivo y cargar archivos en algunos directorios." } ], "id": "CVE-2019-5268", "lastModified": "2024-11-21T04:44:38.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-29T21:15:11.387", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-29 20:15
Modified
2024-11-21 04:44
Severity ?
Summary
Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D1F115-4B8D-498E-A1C0-FB2A99D86314", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FC9A3-B7E5-4AC8-8335-1FE9F434A75B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "693353FE-21A4-4A20-B84B-88CD5A94E7C9", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "10.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F39EBBE2-02F4-49C9-A37E-1A8055A7A29E", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3D1A03-BF26-49EF-818F-E2605BCE7CA9", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0EB8D0D-664A-4328-A340-B800D4C4F82F", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "F50D5403-BDD7-4733-8EB2-AF960998EC29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D65D593-3B3C-454F-B03D-EA098A66A8D7", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F964D58-E5DC-459F-8BAE-DC64611C0B1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AE1D8B1-E2E7-430E-892E-8B0CF866E324", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "24346A08-F63F-4C1C-9C56-C38CFE951319", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E14134F5-65F9-4AA6-B0B0-D0BB29DD236A", "versionEndExcluding": "10.0.2.9", "versionStartIncluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749DBE68-7829-4C8C-8E77-A318A6C069E9", "versionEndExcluding": "10.0.2.9", "versionStartIncluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A60FDB8-D441-4758-8039-EC72D82129F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23F869F-205E-4A16-8F39-D2ADE2FC0110", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF176F6-C4F5-42C4-8062-944BE659B676", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7964BB3B-2879-42EB-BFC9-88DA80810424", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "10.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "677940C5-A53E-400C-A1B1-3AD9E7A5D8A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A5784B9-75DB-4B3C-A39C-BA5981FE59E8", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "9.0.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9047E74D-FCB4-4AC9-AFD4-4671EA894C01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB327892-DEFF-46E6-8455-BC46BA9A3618", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D7CF494-9BFA-4285-B605-F71038D43F3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "680447F5-F22A-4CB7-82B2-592F2ABDF1BB", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB016862-3469-4CD9-BAE5-5E402FEB6F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A92FF02-EDC8-4CA7-B73A-F2EDF16F19FC", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEEABBD3-61FF-4153-8A74-6EDAAF8139FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D2C5040-4164-4AD5-990C-D0BDBB603CDB", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ABF0A04-286D-41DE-BA82-849C05C8AF28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFD3E480-43D6-4C4C-B87A-D30A4B22A57B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D35B3544-C774-40CD-A1F0-809DE8CAE106", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7EAA3A7-B89D-4590-9052-B54725494E71", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EBF21E5-8CF6-48DA-80ED-58AE59CDA069", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF2E5FB0-A4E7-49D1-A599-10FB1546EC70", "versionEndExcluding": "10.0.2.6", "versionStartIncluding": "9.0.3.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E769E6-D560-4E9F-9AC6-93744DAAF051", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7A7D72-7B25-44B6-9104-E1C246A87794", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "10.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B459C5EE-1F5A-4E23-89CE-E52E8FBB5926", "versionEndExcluding": "10.0.2.7", "versionStartIncluding": "10.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB0E9103-6DDF-4140-8C60-39B667B982D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDF101FC-6BD1-48E5-8ADB-B6B9C29F08AE", "versionEndExcluding": "10.0.2.5", "versionStartIncluding": "9.0.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "F771D83F-8EBA-47E9-9260-C49605EEBCEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege." }, { "lang": "es", "value": "Algunos enrutadores dom\u00e9sticos de Huawei, presentan una vulnerabilidad de autorizaci\u00f3n inapropiada. Debido a la autorizaci\u00f3n inapropiada de determinados programas, un atacante puede explotar esta vulnerabilidad para ejecutar archivos maliciosos cargados y escalar privilegios." } ], "id": "CVE-2019-5269", "lastModified": "2024-11-21T04:44:38.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-29T20:15:12.083", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-12 14:15
Modified
2024-11-21 05:40
Severity ?
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | hirouter-cd30-10_firmware | * | |
huawei | hirouter-cd30-10 | - | |
huawei | hirouter-ct31-10_firmware | * | |
huawei | hirouter-ct31-10 | - | |
huawei | ws5200-12_firmware | * | |
huawei | ws5200-12 | - | |
huawei | ws5281-10_firmware | * | |
huawei | ws5281-10 | - | |
huawei | ws5800-10_firmware | * | |
huawei | ws5800-10 | - | |
huawei | ws7100-10_firmware | * | |
huawei | ws7100-10 | - | |
huawei | ws7200-10_firmware | * | |
huawei | ws7200-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21DAB41B-30DC-4621-9AF0-D60EAB48511B", "versionEndExcluding": "10.0.5.7", "versionStartIncluding": "10.0.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86B841D5-A00F-4A94-B90D-3183C33429FB", "versionEndExcluding": "10.0.2.37", "versionStartIncluding": "10.0.2.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD8A7CD-6AF2-4681-9DED-1A225623FC18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACB670B-E1DC-4734-9683-D3A732F61A54", "versionEndIncluding": "10.0.5.6", "versionStartIncluding": "10.0.1.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DE8454-E98B-4AA4-97A9-61DC3BB0E4B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6855ED3B-FD30-4A51-B748-68A21DDD183D", "versionEndExcluding": "10.0.5.32", "versionStartIncluding": "10.0.5.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A157FDA-330F-4DF0-AF48-8570B4734D62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FE6EB21-4CBC-4E98-BC81-05A298941727", "versionEndExcluding": "10.0.3.33", "versionStartIncluding": "10.0.3.25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F83A176-A2F9-478C-BFA3-1A637095E88B", "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "990433C4-F54F-4B50-8972-68F1CF485E1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "923DA700-265A-4099-BC3D-E5A44A1D747F", "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." }, { "lang": "es", "value": "Algunos productos Huawei presentan una vulnerabilidad de verificaci\u00f3n de entrada insuficiente.\u0026#xa0;Los atacantes pueden explotar esta vulnerabilidad en la LAN para causar un servicio anormal en los dispositivos afectados. Las versiones de productos afectados incluyen: HiRouter-CD30-10 versi\u00f3n 10.0.2.5; HiRouter-CT31-10 versi\u00f3n 10.0.2.20; WS5200-12 versi\u00f3n 10.0.1.9; WS5281 -10 versi\u00f3n 10.0.5.10; WS5800-10 versi\u00f3n 10.0.3.25; WS7100-10 versi\u00f3n 10.0.5.21; WS7200-10 versi\u00f3n 10.0.5.21" } ], "id": "CVE-2020-9122", "lastModified": "2024-11-21T05:40:05.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-12T14:15:14.387", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-5268
Vulnerability from cvelistv5
Published
2019-11-29 20:01
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10 |
Version: 10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories." } ], "problemTypes": [ { "descriptions": [ { "description": "input validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-29T20:01:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5268", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10", "version": { "version_data": [ { "version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "input validation" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5268", "datePublished": "2019-11-29T20:01:51", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5269
Vulnerability from cvelistv5
Published
2019-11-29 19:57
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10 |
Version: 10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:57.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "improper authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-29T19:57:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10", "version": { "version_data": [ { "version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "improper authorization" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5269", "datePublished": "2019-11-29T19:57:58", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:57.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9122
Vulnerability from cvelistv5
Published
2020-10-12 13:37
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 |
Version: 10.0.2.5 Version: 10.0.2.20 Version: 10.0.1.9 Version: 10.0.5.10 Version: 10.0.3.25 Version: 10.0.5.21 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.2.5" }, { "status": "affected", "version": "10.0.2.20" }, { "status": "affected", "version": "10.0.1.9" }, { "status": "affected", "version": "10.0.5.10" }, { "status": "affected", "version": "10.0.3.25" }, { "status": "affected", "version": "10.0.5.21" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Input Verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-12T13:37:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9122", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", "version": { "version_data": [ { "version_value": "10.0.2.5" }, { "version_value": "10.0.2.20" }, { "version_value": "10.0.1.9" }, { "version_value": "10.0.5.10" }, { "version_value": "10.0.3.25" }, { "version_value": "10.0.5.21" }, { "version_value": "10.0.5.21" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Input Verification" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9122", "datePublished": "2020-10-12T13:37:31", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }