Huawei Tony-Tl00B Firmware vulnerabilities
4 known vulnerabilities affecting huawei/tony-tl00b_firmware.
Total CVEs
4
CISA KEV
2
actively exploited
Public exploits
1
Exploited in wild
2
Severity breakdown
HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2020-9109MEDIUMCVSS 4.6fixed in 10.1.0.160\(c01e160r2p11\)2020-10-12
CVE-2020-9109 [MEDIUM] CWE-287 CVE-2020-9109: There is an information disclosure vulnerability in several smartphones. The device does not suffici
There is an information disclosure vulnerability in several smartphones. The device does not sufficiently validate the identity of smart wearable device in certain specific scenario, the attacker need to gain certain information in the victim's smartphone to launch the attack, and successful exploit could cause information disclosure.Affected product
nvd
CVE-2020-0069HIGHCVSS 7.8KEVfixed in 10.0.0.196\(c01e65r2p11\)2020-03-10
CVE-2020-0069 [HIGH] CWE-787 CVE-2020-0069: In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kern
nvd
CVE-2019-5235MEDIUMCVSS 5.3v9.1.0.206\(c01e200r2p3\)2019-12-14
CVE-2019-5235 [MEDIUM] CWE-476 CVE-2019-5235: Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
nvd
CVE-2019-2215HIGHCVSS 7.8KEVPoCfixed in 10.0.0.175\(c01e59r2p11\)2019-10-11
CVE-2019-2215 [HIGH] CWE-416 CVE-2019-2215: A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kerne
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-14172009
nvd