VAR-201602-0181

Vulnerability from variot - Updated: 2025-04-13 23:21

Huawei Mobile WiFi E5151 routers with software before E5151s-2TCPU-V200R001B146D27SP00C00 and E5186 routers with software before V200R001B310D01SP00C00 allow DNS query packets using the static source port, which makes it easier for remote attackers to spoof responses via unspecified vectors. Huawei Mobile provided by Wi-Fi Router E5151 and E5186 Has the problem of using insufficient random values. Insufficient random value used (CWE-330) - CVE-2015-8265 Huawei E5151 and Huawei E5186 Sent from DNS The query source port number is fixed. The attacker DNS By spoofing, LAN It is possible to guide the terminal inside to a malicious server. CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.htmlBy a remote attacker DNS The response is forged, LAN May be directed to a malicious server. HuaweiE51864GLTERouter is a 4G wireless router product from China Huawei. Huawei E5186 is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. There is a security vulnerability in versions earlier than Huawei E5186 4G LTE Router V200R001B310D01SP00C00. A remote attacker could exploit this vulnerability to forge responses

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201602-0181",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "e5151",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "e5151s-2tcpu-v200r001b141d13sp00c1080"
      },
      {
        "model": "e5186",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001b306d01c00"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "e5151",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "version 21.141.13.00.1080"
      },
      {
        "model": "e5186",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "version v200r001b306d01c00"
      },
      {
        "model": "e5186 4g lte router \u003cv200r001b310d01sp00c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "e5151",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "e5186",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "e5151",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "e5151s-2tcpu-v200r001b141d13sp00c1080"
      },
      {
        "model": "e5186",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "huawei",
        "version": "v200r001b306d01c00"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:e5151_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:e5186_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Joel Land of the CERT/CC",
    "sources": [
      {
        "db": "BID",
        "id": "82246"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-8265",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-8265",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 5.0,
            "collateralDamagePotential": "NOT DEFINED",
            "confidentialityImpact": "NONE",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 1.0,
            "exploitability": "PROOF-OF-CONCEPT",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-8265",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "CONFIRMED",
            "severity": "MEDIUM",
            "targetDistribution": "LOW",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2016-00863",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-86226",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-8265",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-8265",
            "trust": 1.6,
            "value": "MEDIUM"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-8265",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-00863",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201602-013",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-86226",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-8265",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei Mobile WiFi E5151 routers with software before E5151s-2TCPU-V200R001B146D27SP00C00 and E5186 routers with software before V200R001B310D01SP00C00 allow DNS query packets using the static source port, which makes it easier for remote attackers to spoof responses via unspecified vectors. Huawei Mobile provided by Wi-Fi Router E5151 and E5186 Has the problem of using insufficient random values. Insufficient random value used (CWE-330) - CVE-2015-8265 Huawei E5151 and Huawei E5186 Sent from DNS The query source port number is fixed. The attacker DNS By spoofing, LAN It is possible to guide the terminal inside to a malicious server. CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.htmlBy a remote attacker DNS The response is forged, LAN May be directed to a malicious server. HuaweiE51864GLTERouter is a 4G wireless router product from China Huawei. Huawei E5186 is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. There is a security vulnerability in versions earlier than Huawei E5186 4G LTE Router V200R001B310D01SP00C00. A remote attacker could exploit this vulnerability to forge responses",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      },
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "BID",
        "id": "82246"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      }
    ],
    "trust": 3.33
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.kb.cert.org/vuls/id/972224",
        "trust": 0.8,
        "type": "poc"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-8265",
        "trust": 3.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#972224",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "82246",
        "trust": 1.5
      },
      {
        "db": "JVN",
        "id": "JVNVU92574416",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "db": "BID",
        "id": "82246"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "id": "VAR-201602-0181",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:21:08.794000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Report Vulnerabilities",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/report-vulnerabilities"
      },
      {
        "title": "DNS Static Source Port Vulnerability in Huawei E5186 (huawei-sa-20160129-01-dns)",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160129-01-dns-en"
      },
      {
        "title": "HuaweiE51864GLTERouter security bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/71245"
      },
      {
        "title": "Huawei E5186 4G LTE Router Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60024"
      },
      {
        "title": "NIST-BULK-CVE-Lookup",
        "trust": 0.1,
        "url": "https://github.com/jaychen2/NIST-BULK-CVE-Lookup "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160129-01-dns-en"
      },
      {
        "trust": 2.4,
        "url": "https://www.kb.cert.org/vuls/id/972224"
      },
      {
        "trust": 1.3,
        "url": "http://www.securityfocus.com/bid/82246"
      },
      {
        "trust": 0.8,
        "url": "http://consumer.huawei.com/lk/mobile-broadband/mobile-wifi/tech-specs/e5151-lk.htm"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8265"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu92574416/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8265"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/jaychen2/nist-bulk-cve-lookup"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "db": "BID",
        "id": "82246"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "db": "BID",
        "id": "82246"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-02-01T00:00:00",
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "date": "2016-02-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "date": "2016-02-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "date": "2016-02-01T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "date": "2016-01-29T00:00:00",
        "db": "BID",
        "id": "82246"
      },
      {
        "date": "2016-02-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "date": "2016-02-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "date": "2016-02-01T21:59:00.127000",
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-02-01T00:00:00",
        "db": "CERT/CC",
        "id": "VU#972224"
      },
      {
        "date": "2016-02-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-00863"
      },
      {
        "date": "2016-11-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-86226"
      },
      {
        "date": "2016-11-28T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-8265"
      },
      {
        "date": "2016-07-05T21:35:00",
        "db": "BID",
        "id": "82246"
      },
      {
        "date": "2016-03-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001343"
      },
      {
        "date": "2016-02-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-8265"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei Mobile WiFi E5151 and E5186 routers use insufficiently random values for DNS queries",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#972224"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-013"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…