All versions up to UKBB_WF820+_1.0.0B06 of ZTE WF820+ LTE Outdoor CPE product are impacted by command injection vulnerability. Due to inadequate parameter verification, unauthorized users can take advantage of this vulnerability to control the user terminal system.
References
Link | Resource |
---|---|
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010662 | Vendor Advisory |
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010662 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010662 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 9.0 |
Information
Published : 2019-06-11 19:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3409
Mitre link : CVE-2019-3409
CVE.ORG link : CVE-2019-3409
JSON object : View
Products Affected
zte
- wf820\+_lte_outdoor_cpe
- wf820\+_lte_outdoor_cpe_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')