10
CVE-2016-6206
- EPSS 1.41%
- Veröffentlicht 24.03.2017 15:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Huawei AR3200 routers with software before V200R007C00SPC600 allow remote attackers to cause a denial of service or execute arbitrary code via a crafted packet.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Huawei ≫ Ar3200 Firmware Versionv200r001c00
Huawei ≫ Ar3200 Firmware Versionv200r001c01
Huawei ≫ Ar3200 Firmware Versionv200r002c00
Huawei ≫ Ar3200 Firmware Versionv200r002c01
Huawei ≫ Ar3200 Firmware Versionv200r002c02
Huawei ≫ Ar3200 Firmware Versionv200r002c05
Huawei ≫ Ar3200 Firmware Versionv200r003c00
Huawei ≫ Ar3200 Firmware Versionv200r003c01
Huawei ≫ Ar3200 Firmware Versionv200r003c05
Huawei ≫ Ar3200 Firmware Versionv200r005c00
Huawei ≫ Ar3200 Firmware Versionv200r005c10
Huawei ≫ Ar3200 Firmware Versionv200r005c20
Huawei ≫ Ar3200 Firmware Versionv200r005c21
Huawei ≫ Ar3200 Firmware Versionv200r005c30
Huawei ≫ Ar3200 Firmware Versionv200r005c31
Huawei ≫ Ar3200 Firmware Versionv200r005c32
Huawei ≫ Ar3200 Firmware Versionv200r006c00
Huawei ≫ Ar3200 Firmware Versionv200r006c10
Huawei ≫ Ar3200 Firmware Versionv200r006c11
Huawei ≫ Ar3200 Firmware Versionv200r006c12
Huawei ≫ Ar3200 Firmware Versionv200r006c13
Huawei ≫ Ar3200 Firmware Versionv200r006c15
Huawei ≫ Ar3200 Firmware Versionv200r006c16
Huawei ≫ Ar3200 Firmware Versionv200r006c17
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.41% | 0.787 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.