Filtered by vendor Zte
Subscriptions
Total
171 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-23144 | 1 Zte | 30 Zxa10 B700v7, Zxa10 B700v7 Firmware, Zxa10 B710c-a12 and 27 more | 2024-11-21 | 9.1 Critical |
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system. | ||||
CVE-2022-23143 | 1 Zte | 2 Otcp, Otcp Firmware | 2024-11-21 | 6.5 Medium |
ZTE OTCP product is impacted by a permission and access control vulnerability. Due to improper permission settings, an attacker with high permissions could use this vulnerability to maliciously delete and modify files. | ||||
CVE-2022-23142 | 1 Zte | 2 Zxen Cg200, Zxen Cg200 Firmware | 2024-11-21 | 5.3 Medium |
ZXEN CG200 has a DoS vulnerability. An attacker could construct and send a large number of HTTP GET requests in a short time, which can make the product management websites not accessible. | ||||
CVE-2022-23141 | 1 Zte | 2 Zxmp M721, Zxmp M721 Firmware | 2024-11-21 | 7.5 High |
ZXMP M721 has an information leak vulnerability. Since the serial port authentication on the ZBOOT interface is not effective although it is enabled, an attacker could use this vulnerability to log in to the device to obtain sensitive information. | ||||
CVE-2022-23139 | 1 Zte | 2 Zxmp M721, Zxmp M721 Firmware | 2024-11-21 | 8.8 High |
ZTE's ZXMP M721 product has a permission and access control vulnerability. Since the folder permission viewed by sftp is 666, which is inconsistent with the actual permission. It’s easy for?users to?ignore the modification?of?the file permission configuration, so that low-authority accounts could actually obtain higher operating permissions on key files. | ||||
CVE-2022-23138 | 1 Zte | 2 Mf297d, Mf297d Firmware | 2024-11-21 | 7.5 High |
ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack. | ||||
CVE-2022-23137 | 1 Zte | 2 Zxcdn, Zxcdn Firmware | 2024-11-21 | 6.1 Medium |
ZTE's ZXCDN product has a reflective XSS vulnerability. The attacker could modify the parameters in the content clearing request url, and when a user clicks the url, an XSS attack will be triggered. | ||||
CVE-2022-23136 | 1 Zte | 2 Zxhn F680, Zxhn F680 Firmware | 2024-11-21 | 5.4 Medium |
There is a stored XSS vulnerability in ZTE home gateway product. An attacker could modify the gateway name by inserting special characters and trigger an XSS attack when the user views the current topology of the device through the management page. | ||||
CVE-2022-23135 | 1 Zte | 4 Zxhn F477, Zxhn F477 Firmware, Zxhn F677 and 1 more | 2024-11-21 | 6.5 Medium |
There is a directory traversal vulnerability in some home gateway products of ZTE. Due to the lack of verification of user modified destination path, an attacker with specific permissions could modify the FTP access path to access and modify the system path contents without authorization, which will cause information leak and affect device operation. | ||||
CVE-2021-21751 | 1 Zte | 1 Zxin10 Cms | 2024-11-21 | 8.1 High |
ZTE BigVideo analysis product has an input verification vulnerability. Due to the inconsistency between the front and back verifications when configuring the large screen page, an attacker with high privileges could exploit this vulnerability to tamper with the URL and cause service exception. | ||||
CVE-2021-21750 | 1 Zte | 1 Zxin10 Cms | 2024-11-21 | 7.8 High |
ZTE BigVideo Analysis product has a privilege escalation vulnerability. Due to improper management of the timed task modification privilege, an attacker with ordinary user permissions could exploit this vulnerability to gain unauthorized access. | ||||
CVE-2021-21749 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 9.8 Critical |
ZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code. | ||||
CVE-2021-21748 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 9.8 Critical |
ZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code. | ||||
CVE-2021-21747 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 6.1 Medium |
ZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information. | ||||
CVE-2021-21746 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 6.1 Medium |
ZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information. | ||||
CVE-2021-21745 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 4.3 Medium |
ZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould use this vulnerability to perform illegal authorization operations by sending a request to the user to click. | ||||
CVE-2021-21744 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 7.5 High |
ZTE MF971R product has a configuration file control vulnerability. An attacker could use this vulnerability to modify the configuration parameters of the device, causing some security functions of the device to be disabled. | ||||
CVE-2021-21743 | 1 Zte | 2 Mf971r, Mf971r Firmware | 2024-11-21 | 4.3 Medium |
ZTE MF971R product has a CRLF injection vulnerability. An attacker could exploit the vulnerability to modify the HTTP response header information through a specially crafted HTTP request. | ||||
CVE-2021-21742 | 1 Zte | 1 Axon 30 Pro Message Service | 2024-11-21 | 5.5 Medium |
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages. | ||||
CVE-2021-21741 | 1 Zte | 2 Zxv10 M910, Zxv10 M910 Firmware | 2024-11-21 | 9.8 Critical |
There is a command execution vulnerability in a ZTE conference management system. As some services are enabled by default, the attacker could exploit this vulnerability to execute arbitrary commands by sending specific serialization command. |