Page 19 of 151 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The version V6.01.03.01 of ZTE ZXCDN IAMWEB product is impacted by a code injection vulnerability. An attacker could exploit the vulnerability to inject malicious code into the management page, resulting in users’ information leakage. La versión V6.01.03.01 del producto ZTE ZXCDN IAMWEB se ve afectada por una vulnerabilidad de inyección de código. Un atacante podría aprovechar la vulnerabilidad para inyectar código malicioso en la página de administración, lo que provocaría la filtración de información de los usuarios. • http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011863 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

All versions up to V2.5.0_EG1T5_TED of ZTE ZXHN H108N product are impacted by an information leak vulnerability. An attacker could exploit the vulnerability to obtain sensitive information and perform unauthorized operations. Todas las versiones hasta V2.5.0_EG1T5_TED del producto ZTE ZXHN H108N se ven afectadas por una vulnerabilidad de fuga de información. Un atacante podría explotar la vulnerabilidad para obtener información confidencial y realizar operaciones no autorizadas. • http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011802 •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

The 9000EV5.0R1B12 version, and all earlier versions of ZTE product ZXUPN-9000E are impacted by the input validation vulnerability. An attacker could exploit this vulnerability for unauthorized operations. La versión 9000EV5.0R1B12 y todas las versiones anteriores del producto ZTE ZXUPN-9000E, están afectadas por la vulnerabilidad de comprobación de entrada. Un atacante podría explotar esta vulnerabilidad para operaciones no autorizadas. • http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011683 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

The 9000EV5.0R1B12 version, and all earlier versions of ZTE product ZXUPN-9000E are impacted by vulnerability of permission and access control. An attacker could exploit this vulnerability to directly reset or change passwords of other accounts. La versión 9000EV5.0R1B12 y todas las versiones anteriores del producto ZTE ZXUPN-9000E están impactadas por una vulnerabilidad de los permisos y el control de acceso. Un atacante podría explotar esta vulnerabilidad para restablecer o cambiar directamente las contraseñas de otras cuentas. • http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011683 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 6.2EPSS: 1%CPEs: 2EXPL: 0

The Sec Consult Security Lab reported an information disclosure vulnerability in MF910S product to ZTE PSIRT in October 2019. Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage. The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security. • http://packetstormsecurity.com/files/158990/ZTE-Mobile-Hotspot-MS910S-Backdoor-Hardcoded-Password.html http://seclists.org/fulldisclosure/2020/Aug/20 http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011722 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •