Search criteria

2 vulnerabilities found for safe_router_p1_firmware by 360

CVE-2018-19031 (GCVE-0-2018-19031)

Vulnerability from nvd – Published: 2019-11-04 14:42 – Updated: 2024-08-05 11:23
VLAI?
Summary
A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897.
Severity ?
No CVSS data available.
CWE
  • Local Code Execution
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:09.028Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.360.cn/News/news/id/188.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "360 Safe Router",
          "vendor": "360 Security Technology, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "V2.0.61.58897"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Local Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-04T14:42:42",
        "orgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
        "shortName": "360ST"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.360.cn/News/news/id/188.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@360.cn",
          "ID": "CVE-2018-19031",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "360 Safe Router",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.0.61.58897"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "360 Security Technology, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Local Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.360.cn/News/news/id/188.html",
              "refsource": "MISC",
              "url": "https://security.360.cn/News/news/id/188.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
    "assignerShortName": "360ST",
    "cveId": "CVE-2018-19031",
    "datePublished": "2019-11-04T14:42:42",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-08-05T11:23:09.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-19031 (GCVE-0-2018-19031)

Vulnerability from cvelistv5 – Published: 2019-11-04 14:42 – Updated: 2024-08-05 11:23
VLAI?
Summary
A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897.
Severity ?
No CVSS data available.
CWE
  • Local Code Execution
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:09.028Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.360.cn/News/news/id/188.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "360 Safe Router",
          "vendor": "360 Security Technology, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "V2.0.61.58897"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Local Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-04T14:42:42",
        "orgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
        "shortName": "360ST"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.360.cn/News/news/id/188.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@360.cn",
          "ID": "CVE-2018-19031",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "360 Safe Router",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.0.61.58897"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "360 Security Technology, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Local Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.360.cn/News/news/id/188.html",
              "refsource": "MISC",
              "url": "https://security.360.cn/News/news/id/188.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "40f8fa2f-7875-43d0-a30e-e901a5537754",
    "assignerShortName": "360ST",
    "cveId": "CVE-2018-19031",
    "datePublished": "2019-11-04T14:42:42",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-08-05T11:23:09.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}