Vulnerabilities (CVE)

Filtered by vendor Zte Subscribe
Total 152 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-39073 1 Zte 2 Mf286r, Mf286r Firmware 2024-02-28 N/A 9.8 CRITICAL
There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.
CVE-2022-39070 1 Zte 4 Zxa10 C300m, Zxa10 C300m Firmware, Zxa10 C350m and 1 more 2024-02-28 N/A 9.8 CRITICAL
There is an access control vulnerability in some ZTE PON OLT products. Due to improper access control settings, remote attackers could use the vulnerability to log in to the device and execute any operation.
CVE-2022-39066 1 Zte 2 Mf286r, Mf286r Firmware 2024-02-28 N/A 8.8 HIGH
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
CVE-2022-39072 1 Zte 4 Mf286r, Mf286r Firmware, Mf289d and 1 more 2024-02-28 N/A 5.4 MEDIUM
There is a SQL injection vulnerability in Some ZTE Mobile Internet products. Due to insufficient validation of the input parameters of the SNTP interface, an authenticated attacker could use the vulnerability to execute stored XSS attacks.
CVE-2022-45957 1 Zte 2 Zxhn-h108ns, Zxhn-h108ns Firmware 2024-02-28 N/A 7.5 HIGH
ZTE ZXHN-H108NS router with firmware version H108NSV1.0.7u_ZRD_GR2_A68 is vulnerable to remote stack buffer overflow.
CVE-2022-23143 1 Zte 2 Otcp, Otcp Firmware 2024-02-28 N/A 6.5 MEDIUM
ZTE OTCP product is impacted by a permission and access control vulnerability. Due to improper permission settings, an attacker with high permissions could use this vulnerability to maliciously delete and modify files.
CVE-2022-39067 1 Zte 2 Mf286r, Mf286r Firmware 2024-02-28 N/A 6.5 MEDIUM
There is a buffer overflow vulnerability in ZTE MF286R. Due to lack of input validation on parameters of the wifi interface, an authenticated attacker could use the vulnerability to perform a denial of service attack.
CVE-2022-39069 1 Zte 1 Zaip-aie 2024-02-28 N/A 5.3 MEDIUM
There is a SQL injection vulnerability in ZTE ZAIP-AIE. Due to lack of input verification by the server, an attacker could trigger an attack by building malicious requests. Exploitation of this vulnerability could cause the leakage of the current table content.
CVE-2022-23144 1 Zte 30 Zxa10 B700v7, Zxa10 B700v7 Firmware, Zxa10 B710c-a12 and 27 more 2024-02-28 N/A 9.1 CRITICAL
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
CVE-2022-23141 1 Zte 2 Zxmp M721, Zxmp M721 Firmware 2024-02-28 N/A 7.5 HIGH
ZXMP M721 has an information leak vulnerability. Since the serial port authentication on the ZBOOT interface is not effective although it is enabled, an attacker could use this vulnerability to log in to the device to obtain sensitive information.
CVE-2022-23142 1 Zte 2 Zxen Cg200, Zxen Cg200 Firmware 2024-02-28 N/A 5.3 MEDIUM
ZXEN CG200 has a DoS vulnerability. An attacker could construct and send a large number of HTTP GET requests in a short time, which can make the product management websites not accessible.
CVE-2022-23139 1 Zte 2 Zxmp M721, Zxmp M721 Firmware 2024-02-28 6.5 MEDIUM 8.8 HIGH
ZTE's ZXMP M721 product has a permission and access control vulnerability. Since the folder permission viewed by sftp is 666, which is inconsistent with the actual permission. It’s easy for?users to?ignore the modification?of?the file permission configuration, so that low-authority accounts could actually obtain higher operating permissions on key files.
CVE-2022-23137 1 Zte 2 Zxcdn, Zxcdn Firmware 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
ZTE's ZXCDN product has a reflective XSS vulnerability. The attacker could modify the parameters in the content clearing request url, and when a user clicks the url, an XSS attack will be triggered.
CVE-2022-23135 1 Zte 4 Zxhn F477, Zxhn F477 Firmware, Zxhn F677 and 1 more 2024-02-28 5.5 MEDIUM 6.5 MEDIUM
There is a directory traversal vulnerability in some home gateway products of ZTE. Due to the lack of verification of user modified destination path, an attacker with specific permissions could modify the FTP access path to access and modify the system path contents without authorization, which will cause information leak and affect device operation.
CVE-2022-23138 1 Zte 2 Mf297d, Mf297d Firmware 2024-02-28 5.0 MEDIUM 7.5 HIGH
ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.
CVE-2022-23136 1 Zte 2 Zxhn F680, Zxhn F680 Firmware 2024-02-28 3.5 LOW 5.4 MEDIUM
There is a stored XSS vulnerability in ZTE home gateway product. An attacker could modify the gateway name by inserting special characters and trigger an XSS attack when the user views the current topology of the device through the management page.
CVE-2021-21744 1 Zte 2 Mf971r, Mf971r Firmware 2024-02-28 5.0 MEDIUM 7.5 HIGH
ZTE MF971R product has a configuration file control vulnerability. An attacker could use this vulnerability to modify the configuration parameters of the device, causing some security functions of the device to be disabled.
CVE-2021-21749 1 Zte 2 Mf971r, Mf971r Firmware 2024-02-28 7.5 HIGH 9.8 CRITICAL
ZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code.
CVE-2021-21750 1 Zte 1 Zxin10 Cms 2024-02-28 4.6 MEDIUM 7.8 HIGH
ZTE BigVideo Analysis product has a privilege escalation vulnerability. Due to improper management of the timed task modification privilege, an attacker with ordinary user permissions could exploit this vulnerability to gain unauthorized access.
CVE-2021-21742 1 Zte 1 Axon 30 Pro Message Service 2024-02-28 4.3 MEDIUM 5.5 MEDIUM
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.