FKIE_CVE-2019-5268
Vulnerability from fkie_nvd - Published: 2019-11-29 21:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D1F115-4B8D-498E-A1C0-FB2A99D86314",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8FC9A3-B7E5-4AC8-8335-1FE9F434A75B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "693353FE-21A4-4A20-B84B-88CD5A94E7C9",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F39EBBE2-02F4-49C9-A37E-1A8055A7A29E",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3D1A03-BF26-49EF-818F-E2605BCE7CA9",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.2.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EB8D0D-664A-4328-A340-B800D4C4F82F",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F50D5403-BDD7-4733-8EB2-AF960998EC29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D65D593-3B3C-454F-B03D-EA098A66A8D7",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F964D58-E5DC-459F-8BAE-DC64611C0B1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE1D8B1-E2E7-430E-892E-8B0CF866E324",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24346A08-F63F-4C1C-9C56-C38CFE951319",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E14134F5-65F9-4AA6-B0B0-D0BB29DD236A",
"versionEndExcluding": "10.0.2.9",
"versionStartIncluding": "10.0.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749DBE68-7829-4C8C-8E77-A318A6C069E9",
"versionEndExcluding": "10.0.2.9",
"versionStartIncluding": "10.0.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A60FDB8-D441-4758-8039-EC72D82129F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C23F869F-205E-4A16-8F39-D2ADE2FC0110",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF176F6-C4F5-42C4-8062-944BE659B676",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7964BB3B-2879-42EB-BFC9-88DA80810424",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "677940C5-A53E-400C-A1B1-3AD9E7A5D8A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5784B9-75DB-4B3C-A39C-BA5981FE59E8",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9047E74D-FCB4-4AC9-AFD4-4671EA894C01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB327892-DEFF-46E6-8455-BC46BA9A3618",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7CF494-9BFA-4285-B605-F71038D43F3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "680447F5-F22A-4CB7-82B2-592F2ABDF1BB",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB016862-3469-4CD9-BAE5-5E402FEB6F67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A92FF02-EDC8-4CA7-B73A-F2EDF16F19FC",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEEABBD3-61FF-4153-8A74-6EDAAF8139FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D2C5040-4164-4AD5-990C-D0BDBB603CDB",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABF0A04-286D-41DE-BA82-849C05C8AF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD3E480-43D6-4C4C-B87A-D30A4B22A57B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D35B3544-C774-40CD-A1F0-809DE8CAE106",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7EAA3A7-B89D-4590-9052-B54725494E71",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBF21E5-8CF6-48DA-80ED-58AE59CDA069",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2E5FB0-A4E7-49D1-A599-10FB1546EC70",
"versionEndExcluding": "10.0.2.6",
"versionStartIncluding": "9.0.3.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E769E6-D560-4E9F-9AC6-93744DAAF051",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E7A7D72-7B25-44B6-9104-E1C246A87794",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "10.0.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B459C5EE-1F5A-4E23-89CE-E52E8FBB5926",
"versionEndExcluding": "10.0.2.7",
"versionStartIncluding": "10.0.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0E9103-6DDF-4140-8C60-39B667B982D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF101FC-6BD1-48E5-8ADB-B6B9C29F08AE",
"versionEndExcluding": "10.0.2.5",
"versionStartIncluding": "9.0.3.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F771D83F-8EBA-47E9-9260-C49605EEBCEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories."
},
{
"lang": "es",
"value": "Algunos enrutadores dom\u00e9sticos de Huawei presentan una vulnerabilidad de comprobaci\u00f3n de entrada. Debido a que el par\u00e1metro de entrada no es verificado correctamente, un atacante puede explotar esta vulnerabilidad mediante el env\u00edo de paquetes especiales construidos para obtener archivos en el dispositivo y cargar archivos en algunos directorios."
}
],
"id": "CVE-2019-5268",
"lastModified": "2024-11-21T04:44:38.527",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-29T21:15:11.387",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191113-01-homerouter-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…