VAR-201704-0473

Vulnerability from variot - Updated: 2025-04-20 23:29

Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions have a CSRF vulnerability. The products do not use the Token mechanism for web access control. When users log in to the Huawei servers and access websites containing the malicious CSRF script, the CSRF script is executed, which may cause configuration tampering and system restart. plural Huawei Tecal The product contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Huawei TecalRH1288V2 is a server of Huawei (Huawei) of China. A cross-site request forgery vulnerability exists in several Huawei servers. A remote attacker could exploit the vulnerability to tamper with the configuration or cause a system reboot. Huawei Tecal RH1288 V2 and others are all servers of the Chinese company Huawei

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0473",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tecal rh2265 v2",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "tecal rh2268 v2",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "tecal bh620 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc107"
      },
      {
        "model": "tecal bh621 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc106"
      },
      {
        "model": "tecal bh622 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc110"
      },
      {
        "model": "tecal bh640 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc108"
      },
      {
        "model": "tecal ch121",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc180"
      },
      {
        "model": "tecal ch140",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc110"
      },
      {
        "model": "tecal ch220",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc180"
      },
      {
        "model": "tecal ch221",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc180"
      },
      {
        "model": "tecal ch222",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc180"
      },
      {
        "model": "tecal ch240",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc180"
      },
      {
        "model": "tecal ch242 v3",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc110"
      },
      {
        "model": "tecal ch242",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc180"
      },
      {
        "model": "tecal dh310 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc110"
      },
      {
        "model": "tecal dh320 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc106"
      },
      {
        "model": "tecal dh620 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc106"
      },
      {
        "model": "tecal dh621 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc107"
      },
      {
        "model": "tecal dh628 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc107"
      },
      {
        "model": "tecal rh1288 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc107"
      },
      {
        "model": "tecal rh2285 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc115"
      },
      {
        "model": "tecal rh2285h v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc111"
      },
      {
        "model": "tecal rh2288 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc117"
      },
      {
        "model": "tecal rh2288h v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc115"
      },
      {
        "model": "tecal rh2485 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c00spc502"
      },
      {
        "model": "tecal rh5885 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c02spc109"
      },
      {
        "model": "tecal rh5885 v3",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003c01spc102"
      },
      {
        "model": "tecal rh5885h v3",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003c00spc102"
      },
      {
        "model": "tecal xh310 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc110"
      },
      {
        "model": "tecal xh311 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc110"
      },
      {
        "model": "tecal xh320 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc110"
      },
      {
        "model": "tecal xh621 v2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00spc106"
      },
      {
        "model": "tecal",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tecal rh2285h v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00spc111"
      },
      {
        "model": "tecal rh2285 v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00spc115"
      },
      {
        "model": "tecal rh2288h v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00spc115"
      },
      {
        "model": "tecal rh5885 v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r001c02spc109"
      },
      {
        "model": "tecal rh2485 v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00spc502"
      },
      {
        "model": "tecal rh1288 v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00spc107"
      },
      {
        "model": "tecal rh2288 v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00spc117"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_bh620_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_bh621_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_bh622_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_bh640_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch121_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch140_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch220_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch221_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch222_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch240_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch242_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_ch242_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_dh310_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_dh320_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_dh620_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_dh621_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_dh628_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh1288_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2265_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2268_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2285_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2285h_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2288_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2288h_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh2485_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh5885_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh5885_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_rh5885h_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_xh310_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_xh311_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_xh320_v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:tecal_xh621_v2_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      }
    ]
  },
  "cve": "CVE-2014-9694",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2014-9694",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2017-04638",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-77639",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2014-9694",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-9694",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-9694",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-04638",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-201",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-77639",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions have a CSRF vulnerability. The products do not use the Token mechanism for web access control. When users log in to the Huawei servers and access websites containing the malicious CSRF script, the CSRF script is executed, which may cause configuration tampering and system restart. plural Huawei Tecal The product contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Huawei TecalRH1288V2 is a server of Huawei (Huawei) of China. A cross-site request forgery vulnerability exists in several Huawei servers. A remote attacker could exploit the vulnerability to tamper with the configuration or cause a system reboot. Huawei Tecal RH1288 V2 and others are all servers of the Chinese company Huawei",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-9694",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "id": "VAR-201704-0473",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:29:43.405000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Huawei-SA-20141224-01-Tecal",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/hw-408100"
      },
      {
        "title": "Patches for multiple Huawei server cross-site request forgery vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/91950"
      },
      {
        "title": "Repair measures for multiple Huawei server cross-site request forgery vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69048"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.huawei.com/en/psirt/security-advisories/hw-408100"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9694"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9694"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "date": "2017-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "date": "2017-05-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "date": "2017-04-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "date": "2017-04-02T20:59:00.627000",
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-04638"
      },
      {
        "date": "2017-04-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77639"
      },
      {
        "date": "2017-05-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      },
      {
        "date": "2017-04-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2014-9694"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Tecal Product cross-site request forgery vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008284"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-201"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…