Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ws5200\-10_firmware
(Huawei)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-11-29 | CVE-2019-5268 | Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories. | Cd10\-10_firmware, Cd16\-10_firmware, Cd17\-10_firmware, Cd18\-10_firmware, Hirouter\-Cd15\-10_firmware, Hirouter\-Cd20\-10_firmware, Hirouter\-Cd21\-16_firmware, Hirouter\-Cd30\-10_firmware, Hirouter\-Cd30\-11_firmware, Hirouter\-H1\-10_firmware, Tc5200\-10_firmware, Ws5100\-10_firmware, Ws5102\-10_firmware, Ws5106\-10_firmware, Ws5108\-10_firmware, Ws5200\-10_firmware, Ws5200\-11_firmware, Ws5280\-10_firmware, Ws5280\-11_firmware, Ws6500\-10_firmware, Ws6500\-11_firmware, Ws826\-10_firmware | N/A | ||
2019-11-29 | CVE-2019-5269 | Some Huawei home routers have an improper authorization vulnerability. Due to improper authorization of certain programs, an attacker can exploit this vulnerability to execute uploaded malicious files and escalate privilege. | Cd10\-10_firmware, Cd16\-10_firmware, Cd17\-10_firmware, Cd18\-10_firmware, Hirouter\-Cd15\-10_firmware, Hirouter\-Cd20\-10_firmware, Hirouter\-Cd21\-16_firmware, Hirouter\-Cd30\-10_firmware, Hirouter\-Cd30\-11_firmware, Hirouter\-H1\-10_firmware, Tc5200\-10_firmware, Ws5100\-10_firmware, Ws5102\-10_firmware, Ws5106\-10_firmware, Ws5108\-10_firmware, Ws5200\-10_firmware, Ws5200\-11_firmware, Ws5280\-10_firmware, Ws5280\-11_firmware, Ws6500\-10_firmware, Ws6500\-11_firmware, Ws826\-10_firmware | N/A | ||
2018-09-04 | CVE-2018-7937 | In Huawei HiRouter-CD20-10 with the versions before 1.9.6 and WS5200-10 with the versions before 1.9.6, there is a plug-in signature bypass vulnerability due to insufficient plug-in verification. An attacker may tamper with a legitimate plug-in to build a malicious plug-in and trick users into installing it. Successful exploit could allow the attacker to obtain the root permission of the device and take full control over the device. | Hirouter\-Cd20_firmware, Ws5200\-10_firmware | 7.8 |