Search criteria

2 vulnerabilities found for zxdt22_sf01_firmware by zte

CVE-2017-10933 (GCVE-0-2017-10933)

Vulnerability from nvd – Published: 2017-10-19 21:00 – Updated: 2024-09-16 23:10
VLAI?
Summary
All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address.
Severity ?
No CVSS data available.
CWE
  • Directory Traversal
Assigner
zte
References
Impacted products
Vendor Product Version
ZTE ZXDT22 SF01 Affected: All versions prior to V2.06.00.00
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ZXDT22 SF01",
          "vendor": "ZTE",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to V2.06.00.00"
            }
          ]
        }
      ],
      "datePublic": "2017-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Directory Traversal",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-19T20:57:01",
        "orgId": "6786b568-6808-4982-b61f-398b0d9679eb",
        "shortName": "zte"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@zte.com.cn",
          "DATE_PUBLIC": "2017-10-09T00:00:00",
          "ID": "CVE-2017-10933",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ZXDT22 SF01",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to V2.06.00.00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ZTE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Directory Traversal"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582",
              "refsource": "CONFIRM",
              "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6786b568-6808-4982-b61f-398b0d9679eb",
    "assignerShortName": "zte",
    "cveId": "CVE-2017-10933",
    "datePublished": "2017-10-19T21:00:00Z",
    "dateReserved": "2017-07-05T00:00:00",
    "dateUpdated": "2024-09-16T23:10:37.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10933 (GCVE-0-2017-10933)

Vulnerability from cvelistv5 – Published: 2017-10-19 21:00 – Updated: 2024-09-16 23:10
VLAI?
Summary
All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address.
Severity ?
No CVSS data available.
CWE
  • Directory Traversal
Assigner
zte
References
Impacted products
Vendor Product Version
ZTE ZXDT22 SF01 Affected: All versions prior to V2.06.00.00
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ZXDT22 SF01",
          "vendor": "ZTE",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to V2.06.00.00"
            }
          ]
        }
      ],
      "datePublic": "2017-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Directory Traversal",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-19T20:57:01",
        "orgId": "6786b568-6808-4982-b61f-398b0d9679eb",
        "shortName": "zte"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@zte.com.cn",
          "DATE_PUBLIC": "2017-10-09T00:00:00",
          "ID": "CVE-2017-10933",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ZXDT22 SF01",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to V2.06.00.00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ZTE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Directory Traversal"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582",
              "refsource": "CONFIRM",
              "url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008582"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6786b568-6808-4982-b61f-398b0d9679eb",
    "assignerShortName": "zte",
    "cveId": "CVE-2017-10933",
    "datePublished": "2017-10-19T21:00:00Z",
    "dateReserved": "2017-07-05T00:00:00",
    "dateUpdated": "2024-09-16T23:10:37.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}