Huawei

Tony-al00b Firmware

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 13.07.2021 12:15:09
  • Last modified 21.11.2024 05:50:07

There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent...

  • EPSS 0.35%
  • Published 07.12.2020 13:15:11
  • Last modified 21.11.2024 05:40:15

There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into install...

  • EPSS 0.03%
  • Published 12.10.2020 14:15:14
  • Last modified 21.11.2024 05:40:03

There is an information disclosure vulnerability in several smartphones. The device does not sufficiently validate the identity of smart wearable device in certain specific scenario, the attacker need to gain certain information in the victim's smart...

  • EPSS 0.03%
  • Published 03.09.2020 19:15:12
  • Last modified 21.11.2024 05:40:12

Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.212(C432E1...

  • EPSS 0.1%
  • Published 15.06.2020 16:15:23
  • Last modified 21.11.2024 05:39:59

HUAWEI P30;HUAWEI P30 Pro;Tony-AL00B smartphones with versions earlier than 10.1.0.135(C00E135R2P11); versions earlier than 10.1.0.135(C00E135R2P8), versions earlier than 10.1.0.135 have an improper authentication vulnerability. Due to the identity o...

Warning
  • EPSS 0.74%
  • Published 10.03.2020 20:15:21
  • Last modified 04.04.2025 13:01:47

In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution...

  • EPSS 0.25%
  • Published 14.12.2019 00:15:10
  • Last modified 21.11.2024 04:44:34

Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.

Warning Exploit
  • EPSS 49.83%
  • Published 11.10.2019 19:15:10
  • Last modified 04.04.2025 15:40:44

A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local appli...

  • EPSS 3.04%
  • Published 14.08.2019 17:15:11
  • Last modified 21.11.2024 04:51:45

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") tha...