cve-2019-5268
Vulnerability from cvelistv5
Published
2019-11-29 20:01
Modified
2024-08-04 19:47
Severity ?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.841Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "input validation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-29T20:01:51",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5268",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CD10-10, CD16-10, CD17-10, CD18-10, HiRouter-CD15-10, HiRouter-CD20-10, HiRouter-CD21-16, HiRouter-CD30-10, HiRouter-CD30-11, HiRouter-H1-10, TC5200-10, WS5100-10, WS5102-10, WS5106-10, WS5108-10, WS5200-10, WS5200-11, , WS5280-10, WS5280-11, WS6500-10, WS6500-11, WS826-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.2.2, 10.0.2.3, 9.0.3.3, 9.0.2.23, 9.0.2.3, 9.0.3.9, 10.0.2.8, 9.0.3.11, 9.0.3.22"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "input validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5268",
    "datePublished": "2019-11-29T20:01:51",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-5268\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2019-11-29T21:15:11.387\",\"lastModified\":\"2024-11-21T04:44:38.527\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.\"},{\"lang\":\"es\",\"value\":\"Algunos enrutadores dom\u00e9sticos de Huawei presentan una vulnerabilidad de comprobaci\u00f3n de entrada. Debido a que el par\u00e1metro de entrada no es verificado correctamente, un atacante puede explotar esta vulnerabilidad mediante el env\u00edo de paquetes especiales construidos para obtener archivos en el dispositivo y cargar archivos en algunos directorios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":4.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.2\",\"versionEndExcluding\":\"10.0.2.7\",\"matchCriteriaId\":\"E1D1F115-4B8D-498E-A1C0-FB2A99D86314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8FC9A3-B7E5-4AC8-8335-1FE9F434A75B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.3\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"693353FE-21A4-4A20-B84B-88CD5A94E7C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E4BF946-F846-4B59-A8BD-71D3C32FA9DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.3\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"F39EBBE2-02F4-49C9-A37E-1A8055A7A29E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86840A12-552E-4673-9459-9C888D311227\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.2.23\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"AB3D1A03-BF26-49EF-818F-E2605BCE7CA9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3B85A0E-7A60-464B-BDA0-F62CBB91D469\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.2.3\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"D0EB8D0D-664A-4328-A340-B800D4C4F82F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F50D5403-BDD7-4733-8EB2-AF960998EC29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.9\",\"versionEndExcluding\":\"10.0.2.6\",\"matchCriteriaId\":\"6D65D593-3B3C-454F-B03D-EA098A66A8D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F964D58-E5DC-459F-8BAE-DC64611C0B1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.9\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"1AE1D8B1-E2E7-430E-892E-8B0CF866E324\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24346A08-F63F-4C1C-9C56-C38CFE951319\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.8\",\"versionEndExcluding\":\"10.0.2.9\",\"matchCriteriaId\":\"E14134F5-65F9-4AA6-B0B0-D0BB29DD236A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"593BD59F-41AA-4AEB-8F13-43484BE26E1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.8\",\"versionEndExcluding\":\"10.0.2.9\",\"matchCriteriaId\":\"749DBE68-7829-4C8C-8E77-A318A6C069E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A60FDB8-D441-4758-8039-EC72D82129F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.11\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"C23F869F-205E-4A16-8F39-D2ADE2FC0110\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF176F6-C4F5-42C4-8062-944BE659B676\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.3\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"7964BB3B-2879-42EB-BFC9-88DA80810424\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677940C5-A53E-400C-A1B1-3AD9E7A5D8A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.11\",\"versionEndExcluding\":\"10.0.2.7\",\"matchCriteriaId\":\"8A5784B9-75DB-4B3C-A39C-BA5981FE59E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9047E74D-FCB4-4AC9-AFD4-4671EA894C01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.2\",\"versionEndExcluding\":\"10.0.2.7\",\"matchCriteriaId\":\"FB327892-DEFF-46E6-8455-BC46BA9A3618\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D7CF494-9BFA-4285-B605-F71038D43F3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.2\",\"versionEndExcluding\":\"10.0.2.7\",\"matchCriteriaId\":\"680447F5-F22A-4CB7-82B2-592F2ABDF1BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB016862-3469-4CD9-BAE5-5E402FEB6F67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.2\",\"versionEndExcluding\":\"10.0.2.7\",\"matchCriteriaId\":\"2A92FF02-EDC8-4CA7-B73A-F2EDF16F19FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEEABBD3-61FF-4153-8A74-6EDAAF8139FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.9\",\"versionEndExcluding\":\"10.0.2.6\",\"matchCriteriaId\":\"1D2C5040-4164-4AD5-990C-D0BDBB603CDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABF0A04-286D-41DE-BA82-849C05C8AF28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD3E480-43D6-4C4C-B87A-D30A4B22A57B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D35B3544-C774-40CD-A1F0-809DE8CAE106\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C907A885-BA32-4819-B53C-0FBFE38C2510\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.22\",\"versionEndExcluding\":\"10.0.2.6\",\"matchCriteriaId\":\"B7EAA3A7-B89D-4590-9052-B54725494E71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBF21E5-8CF6-48DA-80ED-58AE59CDA069\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.22\",\"versionEndExcluding\":\"10.0.2.6\",\"matchCriteriaId\":\"EF2E5FB0-A4E7-49D1-A599-10FB1546EC70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E769E6-D560-4E9F-9AC6-93744DAAF051\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.3\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"8E7A7D72-7B25-44B6-9104-E1C246A87794\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C660061-69B0-43B8-BFD3-E858C6B2B437\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.2.2\",\"versionEndExcluding\":\"10.0.2.7\",\"matchCriteriaId\":\"B459C5EE-1F5A-4E23-89CE-E52E8FBB5926\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0E9103-6DDF-4140-8C60-39B667B982D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.3.11\",\"versionEndExcluding\":\"10.0.2.5\",\"matchCriteriaId\":\"DDF101FC-6BD1-48E5-8ADB-B6B9C29F08AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F771D83F-8EBA-47E9-9260-C49605EEBCEA\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.