Search criteria
9 vulnerabilities found for hirouter-cd30-10_firmware by huawei
FKIE_CVE-2020-9122
Vulnerability from fkie_nvd - Published: 2020-10-12 14:15 - Updated: 2024-11-21 05:40
Severity ?
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | hirouter-cd30-10_firmware | * | |
| huawei | hirouter-cd30-10 | - | |
| huawei | hirouter-ct31-10_firmware | * | |
| huawei | hirouter-ct31-10 | - | |
| huawei | ws5200-12_firmware | * | |
| huawei | ws5200-12 | - | |
| huawei | ws5281-10_firmware | * | |
| huawei | ws5281-10 | - | |
| huawei | ws5800-10_firmware | * | |
| huawei | ws5800-10 | - | |
| huawei | ws7100-10_firmware | * | |
| huawei | ws7100-10 | - | |
| huawei | ws7200-10_firmware | * | |
| huawei | ws7200-10 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21DAB41B-30DC-4621-9AF0-D60EAB48511B",
"versionEndExcluding": "10.0.5.7",
"versionStartIncluding": "10.0.2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86B841D5-A00F-4A94-B90D-3183C33429FB",
"versionEndExcluding": "10.0.2.37",
"versionStartIncluding": "10.0.2.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD8A7CD-6AF2-4681-9DED-1A225623FC18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EACB670B-E1DC-4734-9683-D3A732F61A54",
"versionEndIncluding": "10.0.5.6",
"versionStartIncluding": "10.0.1.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DE8454-E98B-4AA4-97A9-61DC3BB0E4B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6855ED3B-FD30-4A51-B748-68A21DDD183D",
"versionEndExcluding": "10.0.5.32",
"versionStartIncluding": "10.0.5.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A157FDA-330F-4DF0-AF48-8570B4734D62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6EB21-4CBC-4E98-BC81-05A298941727",
"versionEndExcluding": "10.0.3.33",
"versionStartIncluding": "10.0.3.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F83A176-A2F9-478C-BFA3-1A637095E88B",
"versionEndExcluding": "10.0.5.37",
"versionStartIncluding": "10.0.5.21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "990433C4-F54F-4B50-8972-68F1CF485E1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "923DA700-265A-4099-BC3D-E5A44A1D747F",
"versionEndExcluding": "10.0.5.37",
"versionStartIncluding": "10.0.5.21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
},
{
"lang": "es",
"value": "Algunos productos Huawei presentan una vulnerabilidad de verificaci\u00f3n de entrada insuficiente.\u0026#xa0;Los atacantes pueden explotar esta vulnerabilidad en la LAN para causar un servicio anormal en los dispositivos afectados. Las versiones de productos afectados incluyen: HiRouter-CD30-10 versi\u00f3n 10.0.2.5; HiRouter-CT31-10 versi\u00f3n 10.0.2.20; WS5200-12 versi\u00f3n 10.0.1.9; WS5281 -10 versi\u00f3n 10.0.5.10; WS5800-10 versi\u00f3n 10.0.3.25; WS7100-10 versi\u00f3n 10.0.5.21; WS7200-10 versi\u00f3n 10.0.5.21"
}
],
"id": "CVE-2020-9122",
"lastModified": "2024-11-21T05:40:05.620",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-12T14:15:14.387",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5268
Vulnerability from fkie_nvd - Published: 2019-11-29 21:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D1F115-4B8D-498E-A1C0-FB2A99D86314",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8FC9A3-B7E5-4AC8-8335-1FE9F434A75B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "693353FE-21A4-4A20-B84B-88CD5A94E7C9",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F39EBBE2-02F4-49C9-A37E-1A8055A7A29E",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3D1A03-BF26-49EF-818F-E2605BCE7CA9",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.2.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EB8D0D-664A-4328-A340-B800D4C4F82F",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F50D5403-BDD7-4733-8EB2-AF960998EC29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D65D593-3B3C-454F-B03D-EA098A66A8D7",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F964D58-E5DC-459F-8BAE-DC64611C0B1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE1D8B1-E2E7-430E-892E-8B0CF866E324",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24346A08-F63F-4C1C-9C56-C38CFE951319",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E14134F5-65F9-4AA6-B0B0-D0BB29DD236A",
"versionEndExcluding": "10.0.2.9",
"versionStartIncluding": "10.0.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749DBE68-7829-4C8C-8E77-A318A6C069E9",
"versionEndExcluding": "10.0.2.9",
"versionStartIncluding": "10.0.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A60FDB8-D441-4758-8039-EC72D82129F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C23F869F-205E-4A16-8F39-D2ADE2FC0110",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF176F6-C4F5-42C4-8062-944BE659B676",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7964BB3B-2879-42EB-BFC9-88DA80810424",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "677940C5-A53E-400C-A1B1-3AD9E7A5D8A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5784B9-75DB-4B3C-A39C-BA5981FE59E8",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9047E74D-FCB4-4AC9-AFD4-4671EA894C01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB327892-DEFF-46E6-8455-BC46BA9A3618",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7CF494-9BFA-4285-B605-F71038D43F3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "680447F5-F22A-4CB7-82B2-592F2ABDF1BB",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB016862-3469-4CD9-BAE5-5E402FEB6F67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A92FF02-EDC8-4CA7-B73A-F2EDF16F19FC",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEEABBD3-61FF-4153-8A74-6EDAAF8139FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D2C5040-4164-4AD5-990C-D0BDBB603CDB",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABF0A04-286D-41DE-BA82-849C05C8AF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD3E480-43D6-4C4C-B87A-D30A4B22A57B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D35B3544-C774-40CD-A1F0-809DE8CAE106",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7EAA3A7-B89D-4590-9052-B54725494E71",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBF21E5-8CF6-48DA-80ED-58AE59CDA069",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2E5FB0-A4E7-49D1-A599-10FB1546EC70",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E769E6-D560-4E9F-9AC6-93744DAAF051",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E7A7D72-7B25-44B6-9104-E1C246A87794",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B459C5EE-1F5A-4E23-89CE-E52E8FBB5926",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0E9103-6DDF-4140-8C60-39B667B982D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF101FC-6BD1-48E5-8ADB-B6B9C29F08AE",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F771D83F-8EBA-47E9-9260-C49605EEBCEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
},
{
"lang": "es",
"value": "Algunos enrutadores dom\u00e9sticos de Huawei presentan una vulnerabilidad de comprobaci\u00f3n de entrada. Debido a que el par\u00e1metro de entrada no es verificado correctamente, un atacante puede explotar esta vulnerabilidad mediante el env\u00edo de paquetes especiales construidos para obtener archivos en el dispositivo y cargar archivos en algunos directorios."
}
],
"id": "CVE-2019-5268",
"lastModified": "2024-11-21T04:44:38.527",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-29T21:15:11.387",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5269
Vulnerability from fkie_nvd - Published: 2019-11-29 20:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D1F115-4B8D-498E-A1C0-FB2A99D86314",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8FC9A3-B7E5-4AC8-8335-1FE9F434A75B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "693353FE-21A4-4A20-B84B-88CD5A94E7C9",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F39EBBE2-02F4-49C9-A37E-1A8055A7A29E",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3D1A03-BF26-49EF-818F-E2605BCE7CA9",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.2.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EB8D0D-664A-4328-A340-B800D4C4F82F",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F50D5403-BDD7-4733-8EB2-AF960998EC29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D65D593-3B3C-454F-B03D-EA098A66A8D7",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F964D58-E5DC-459F-8BAE-DC64611C0B1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE1D8B1-E2E7-430E-892E-8B0CF866E324",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24346A08-F63F-4C1C-9C56-C38CFE951319",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E14134F5-65F9-4AA6-B0B0-D0BB29DD236A",
"versionEndExcluding": "10.0.2.9",
"versionStartIncluding": "10.0.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749DBE68-7829-4C8C-8E77-A318A6C069E9",
"versionEndExcluding": "10.0.2.9",
"versionStartIncluding": "10.0.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A60FDB8-D441-4758-8039-EC72D82129F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C23F869F-205E-4A16-8F39-D2ADE2FC0110",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF176F6-C4F5-42C4-8062-944BE659B676",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7964BB3B-2879-42EB-BFC9-88DA80810424",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "677940C5-A53E-400C-A1B1-3AD9E7A5D8A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5784B9-75DB-4B3C-A39C-BA5981FE59E8",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9047E74D-FCB4-4AC9-AFD4-4671EA894C01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB327892-DEFF-46E6-8455-BC46BA9A3618",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7CF494-9BFA-4285-B605-F71038D43F3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "680447F5-F22A-4CB7-82B2-592F2ABDF1BB",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB016862-3469-4CD9-BAE5-5E402FEB6F67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A92FF02-EDC8-4CA7-B73A-F2EDF16F19FC",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEEABBD3-61FF-4153-8A74-6EDAAF8139FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D2C5040-4164-4AD5-990C-D0BDBB603CDB",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABF0A04-286D-41DE-BA82-849C05C8AF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD3E480-43D6-4C4C-B87A-D30A4B22A57B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D35B3544-C774-40CD-A1F0-809DE8CAE106",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7EAA3A7-B89D-4590-9052-B54725494E71",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBF21E5-8CF6-48DA-80ED-58AE59CDA069",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2E5FB0-A4E7-49D1-A599-10FB1546EC70",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E769E6-D560-4E9F-9AC6-93744DAAF051",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E7A7D72-7B25-44B6-9104-E1C246A87794",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B459C5EE-1F5A-4E23-89CE-E52E8FBB5926",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0E9103-6DDF-4140-8C60-39B667B982D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF101FC-6BD1-48E5-8ADB-B6B9C29F08AE",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F771D83F-8EBA-47E9-9260-C49605EEBCEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege."
},
{
"lang": "es",
"value": "Algunos enrutadores dom\u00e9sticos de Huawei, presentan una vulnerabilidad de autorizaci\u00f3n inapropiada. Debido a la autorizaci\u00f3n inapropiada de determinados programas, un atacante puede explotar esta vulnerabilidad para ejecutar archivos maliciosos cargados y escalar privilegios."
}
],
"id": "CVE-2019-5269",
"lastModified": "2024-11-21T04:44:38.663",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-29T20:15:12.083",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2020-9122 (GCVE-0-2020-9122)
Vulnerability from cvelistv5 – Published: 2020-10-12 13:37 – Updated: 2024-08-04 10:19
VLAI?
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.
Severity ?
No CVSS data available.
CWE
- Insufficient Input Verification
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 |
Affected:
10.0.2.5
Affected: 10.0.2.20 Affected: 10.0.1.9 Affected: 10.0.5.10 Affected: 10.0.3.25 Affected: 10.0.5.21 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T10:19:20.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "10.0.2.5"
},
{
"status": "affected",
"version": "10.0.2.20"
},
{
"status": "affected",
"version": "10.0.1.9"
},
{
"status": "affected",
"version": "10.0.5.10"
},
{
"status": "affected",
"version": "10.0.3.25"
},
{
"status": "affected",
"version": "10.0.5.21"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Insufficient Input Verification",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-12T13:37:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-9122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10",
"version": {
"version_data": [
{
"version_value": "10.0.2.5"
},
{
"version_value": "10.0.2.20"
},
{
"version_value": "10.0.1.9"
},
{
"version_value": "10.0.5.10"
},
{
"version_value": "10.0.3.25"
},
{
"version_value": "10.0.5.21"
},
{
"version_value": "10.0.5.21"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient Input Verification"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-9122",
"datePublished": "2020-10-12T13:37:31",
"dateReserved": "2020-02-18T00:00:00",
"dateUpdated": "2024-08-04T10:19:20.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5268 (GCVE-0-2019-5268)
Vulnerability from cvelistv5 – Published: 2019-11-29 20:01 – Updated: 2024-08-04 19:47
VLAI?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
Severity ?
No CVSS data available.
CWE
- input validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10 |
Affected:
10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.841Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "input validation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-29T20:01:51",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5268",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"version": {
"version_data": [
{
"version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "input validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5268",
"datePublished": "2019-11-29T20:01:51",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.841Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5269 (GCVE-0-2019-5269)
Vulnerability from cvelistv5 – Published: 2019-11-29 19:57 – Updated: 2024-08-04 19:47
VLAI?
Summary
Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege.
Severity ?
No CVSS data available.
CWE
- improper authorization
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10 |
Affected:
10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:57.024Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "improper authorization",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-29T19:57:58",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5269",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"version": {
"version_data": [
{
"version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "improper authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5269",
"datePublished": "2019-11-29T19:57:58",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:57.024Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-9122 (GCVE-0-2020-9122)
Vulnerability from nvd – Published: 2020-10-12 13:37 – Updated: 2024-08-04 10:19
VLAI?
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.
Severity ?
No CVSS data available.
CWE
- Insufficient Input Verification
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 |
Affected:
10.0.2.5
Affected: 10.0.2.20 Affected: 10.0.1.9 Affected: 10.0.5.10 Affected: 10.0.3.25 Affected: 10.0.5.21 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T10:19:20.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "10.0.2.5"
},
{
"status": "affected",
"version": "10.0.2.20"
},
{
"status": "affected",
"version": "10.0.1.9"
},
{
"status": "affected",
"version": "10.0.5.10"
},
{
"status": "affected",
"version": "10.0.3.25"
},
{
"status": "affected",
"version": "10.0.5.21"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Insufficient Input Verification",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-12T13:37:31",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2020-9122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10",
"version": {
"version_data": [
{
"version_value": "10.0.2.5"
},
{
"version_value": "10.0.2.20"
},
{
"version_value": "10.0.1.9"
},
{
"version_value": "10.0.5.10"
},
{
"version_value": "10.0.3.25"
},
{
"version_value": "10.0.5.21"
},
{
"version_value": "10.0.5.21"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient Input Verification"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en",
"refsource": "MISC",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2020-9122",
"datePublished": "2020-10-12T13:37:31",
"dateReserved": "2020-02-18T00:00:00",
"dateUpdated": "2024-08-04T10:19:20.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5268 (GCVE-0-2019-5268)
Vulnerability from nvd – Published: 2019-11-29 20:01 – Updated: 2024-08-04 19:47
VLAI?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
Severity ?
No CVSS data available.
CWE
- input validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10 |
Affected:
10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.841Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "input validation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-29T20:01:51",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5268",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"version": {
"version_data": [
{
"version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "input validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5268",
"datePublished": "2019-11-29T20:01:51",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.841Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5269 (GCVE-0-2019-5269)
Vulnerability from nvd – Published: 2019-11-29 19:57 – Updated: 2024-08-04 19:47
VLAI?
Summary
Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege.
Severity ?
No CVSS data available.
CWE
- improper authorization
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10 |
Affected:
10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:57.024Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "improper authorization",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-29T19:57:58",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5269",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
"version": {
"version_data": [
{
"version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "improper authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5269",
"datePublished": "2019-11-29T19:57:58",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:57.024Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}