Search criteria
2 vulnerabilities by 360 Security Technology, Inc.
CVE-2019-3404 (GCVE-0-2019-3404)
Vulnerability from cvelistv5 – Published: 2020-03-04 13:01 – Updated: 2024-08-04 19:12
VLAI?
Summary
By adding some special fields to the uri ofrouter app function, the user could abuse background app cgi functions withoutauthentication. This affects 360 router P0 and F5C.
Severity ?
No CVSS data available.
CWE
- Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| 360 Security Technology, Inc. | 360 Router F5C |
Affected:
360POP-F5C-V3.1.1.65150
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:12:09.558Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.360.cn/News/news/id/218.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "360 Router F5C",
"vendor": "360 Security Technology, Inc.",
"versions": [
{
"status": "affected",
"version": "360POP-F5C-V3.1.1.65150"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "By adding some special fields to the uri ofrouter app function, the user could abuse background app cgi functions withoutauthentication. This affects 360 router P0 and F5C."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-04T13:01:17",
"orgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
"shortName": "360ST"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.360.cn/News/news/id/218.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@360.cn",
"ID": "CVE-2019-3404",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "360 Router F5C",
"version": {
"version_data": [
{
"version_value": "360POP-F5C-V3.1.1.65150"
}
]
}
}
]
},
"vendor_name": "360 Security Technology, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "By adding some special fields to the uri ofrouter app function, the user could abuse background app cgi functions withoutauthentication. This affects 360 router P0 and F5C."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.360.cn/News/news/id/218.html",
"refsource": "CONFIRM",
"url": "https://security.360.cn/News/news/id/218.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
"assignerShortName": "360ST",
"cveId": "CVE-2019-3404",
"datePublished": "2020-03-04T13:01:17",
"dateReserved": "2018-12-19T00:00:00",
"dateUpdated": "2024-08-04T19:12:09.558Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-19031 (GCVE-0-2018-19031)
Vulnerability from cvelistv5 – Published: 2019-11-04 14:42 – Updated: 2024-08-05 11:23
VLAI?
Summary
A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897.
Severity ?
No CVSS data available.
CWE
- Local Code Execution
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| 360 Security Technology, Inc. | 360 Safe Router |
Affected:
V2.0.61.58897
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:23:09.028Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.360.cn/News/news/id/188.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "360 Safe Router",
"vendor": "360 Security Technology, Inc.",
"versions": [
{
"status": "affected",
"version": "V2.0.61.58897"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Local Code Execution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-04T14:42:42",
"orgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
"shortName": "360ST"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.360.cn/News/news/id/188.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@360.cn",
"ID": "CVE-2018-19031",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "360 Safe Router",
"version": {
"version_data": [
{
"version_value": "V2.0.61.58897"
}
]
}
}
]
},
"vendor_name": "360 Security Technology, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Local Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.360.cn/News/news/id/188.html",
"refsource": "MISC",
"url": "https://security.360.cn/News/news/id/188.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
"assignerShortName": "360ST",
"cveId": "CVE-2018-19031",
"datePublished": "2019-11-04T14:42:42",
"dateReserved": "2018-11-06T00:00:00",
"dateUpdated": "2024-08-05T11:23:09.028Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}