ID

VAR-201903-1284


CVE

CVE-2018-19524


TITLE

plural Skyworth Vulnerability related to input validation in device products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015161

DESCRIPTION

An issue was discovered on Shenzhen Skyworth DT741 Converged Intelligent Terminal (G/EPON+IPTV) SDOTBGN1, DT721-cb SDOTBGN1, and DT741-cb SDOTBGN1 devices. A long password to the Web_passwd function allows remote attackers to cause a denial of service (segmentation fault) or achieve unauthenticated remote code execution because of control of registers S0 through S4 and T4 through T7. Skyworth DT741 , DT721-cb , DT741-cb The device contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. There is an input validation error vulnerability in Skyworth GPON HomeGateways and Optical Network terminals. The vulnerability originates from incorrect verification of data boundaries when network systems or products perform operations on memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: DT741 Converged Intelligent Terminal (G/EPON+IPTV); DT741 Converged Intelligent Terminal (G/EPON+IPTV); DT721-cb GPON uplink home gateway (GPON+2FE+1POTS); DT721-cb GPON Uplink Home Gateway (GPON+2FE+1POTS); DT741-cb GPON uplink home gateway (GPON+4FE+1POTS+WIFI+USB); DT741-cb GPON Uplink Home Gateway (GPON+4FE+1POTS+WIFI+USB); DT741 -cbGPON uplink home gateway DT741-cb

Trust: 1.8

sources: NVD: CVE-2018-19524 // JVNDB: JVNDB-2018-015161 // VULHUB: VHN-130192 // VULMON: CVE-2018-19524

AFFECTED PRODUCTS

vendor:skyworthdigitalmodel:dt741-cbscope:eqversion:sdotbgn1

Trust: 1.0

vendor:skyworthdigitalmodel:dt740scope:eqversion:sdotbgn1

Trust: 1.0

vendor:skyworthdigitalmodel:dt721-cbscope:eqversion:sdotbgn1

Trust: 1.0

vendor:skyworth digital holdingsmodel:dt721-cbscope: - version: -

Trust: 0.8

vendor:skyworth digital holdingsmodel:dt741scope: - version: -

Trust: 0.8

vendor:skyworth digital holdingsmodel:dt741-cbscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-015161 // NVD: CVE-2018-19524

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-19524
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-19524
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201902-576
value: CRITICAL

Trust: 0.6

VULHUB: VHN-130192
value: HIGH

Trust: 0.1

VULMON: CVE-2018-19524
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-19524
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-130192
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-19524
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-130192 // VULMON: CVE-2018-19524 // JVNDB: JVNDB-2018-015161 // CNNVD: CNNVD-201902-576 // NVD: CVE-2018-19524

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-130192 // JVNDB: JVNDB-2018-015161 // NVD: CVE-2018-19524

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-576

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201902-576

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015161

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-130192 // VULMON: CVE-2018-19524

PATCH

title:Top Pageurl:https://www.skyworthdigital.com/

Trust: 0.8

title:s3curityb3ast.github.iourl:https://github.com/s3curityb3ast/s3curityb3ast.github.io

Trust: 0.1

sources: VULMON: CVE-2018-19524 // JVNDB: JVNDB-2018-015161

EXTERNAL IDS

db:PACKETSTORMid:151608

Trust: 2.6

db:NVDid:CVE-2018-19524

Trust: 2.6

db:EXPLOIT-DBid:46358

Trust: 1.8

db:JVNDBid:JVNDB-2018-015161

Trust: 0.8

db:CNNVDid:CNNVD-201902-576

Trust: 0.7

db:VULHUBid:VHN-130192

Trust: 0.1

db:VULMONid:CVE-2018-19524

Trust: 0.1

sources: VULHUB: VHN-130192 // VULMON: CVE-2018-19524 // JVNDB: JVNDB-2018-015161 // CNNVD: CNNVD-201902-576 // NVD: CVE-2018-19524

REFERENCES

url:http://packetstormsecurity.com/files/151608/skyworth-gpon-homegateways-optical-network-stack-overflow.html

Trust: 2.6

url:https://seclists.org/bugtraq/2019/feb/21

Trust: 1.8

url:https://www.exploit-db.com/exploits/46358/

Trust: 1.8

url:http://seclists.org/fulldisclosure/2019/feb/30

Trust: 1.8

url:https://s3curityb3ast.github.io/ksa-dev-001.md

Trust: 1.8

url:https://www.breakthesec.com/2019/02/cve-2018-19524-stack-overflow-in.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-19524

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19524

Trust: 0.8

url:http://breakthesec.com

Trust: 0.6

url:https://packetstormsecurity.com/files/cve/cve-2018-19524

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://www.exploit-db.com/exploits/46358

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/s3curityb3ast/s3curityb3ast.github.io

Trust: 0.1

sources: VULHUB: VHN-130192 // VULMON: CVE-2018-19524 // JVNDB: JVNDB-2018-015161 // CNNVD: CNNVD-201902-576 // NVD: CVE-2018-19524

SOURCES

db:VULHUBid:VHN-130192
db:VULMONid:CVE-2018-19524
db:JVNDBid:JVNDB-2018-015161
db:CNNVDid:CNNVD-201902-576
db:NVDid:CVE-2018-19524

LAST UPDATE DATE

2024-11-23T22:58:45.935000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-130192date:2019-05-08T00:00:00
db:VULMONid:CVE-2018-19524date:2019-05-08T00:00:00
db:JVNDBid:JVNDB-2018-015161date:2019-05-08T00:00:00
db:CNNVDid:CNNVD-201902-576date:2020-05-22T00:00:00
db:NVDid:CVE-2018-19524date:2024-11-21T03:58:05.857

SOURCES RELEASE DATE

db:VULHUBid:VHN-130192date:2019-03-21T00:00:00
db:VULMONid:CVE-2018-19524date:2019-03-21T00:00:00
db:JVNDBid:JVNDB-2018-015161date:2019-05-08T00:00:00
db:CNNVDid:CNNVD-201902-576date:2019-02-11T00:00:00
db:NVDid:CVE-2018-19524date:2019-03-21T16:00:31.703