Refine your search
2 vulnerabilities found for by Xiongmai
CVE-2026-34005 (GCVE-0-2026-34005)
Vulnerability from cvelistv5
Published
2026-03-29 17:02
Modified
2026-03-30 14:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Xiongmai | DVR/NVR devices |
Version: 4.03.R11 < |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34005",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-30T14:19:13.856503Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-30T14:19:23.210Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"Sofia binary - hostname configuration handler"
],
"product": "DVR/NVR devices",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.03.R11",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-29T17:09:28.999Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.xiongmaitech.com"
},
{
"url": "https://uky007.github.io/CVE-2026-34005/"
}
],
"x_generator": {
"engine": "CVE-Request-form 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2026-34005",
"datePublished": "2026-03-29T17:02:15.445Z",
"dateReserved": "2026-03-25T05:22:12.479Z",
"dateUpdated": "2026-03-30T14:19:23.210Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2024-3765 (GCVE-0-2024-3765)
Vulnerability from cvelistv5
Published
2024-04-14 23:00
Modified
2024-08-08 20:19
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Controls
Summary
A vulnerability classified as critical was found in Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M. Affected by this vulnerability is an unknown functionality of the component Sofia Service. The manipulation with the input ff00000000000000000000000000f103250000007b202252657422203a203130302c202253657373696f6e494422203a202230783022207d0a leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260605 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Xiongmai | AHB7804R-MH-V2 |
Version: 4.02.R11.24340142.10001.131900.00000 Version: 4.02.R11.A8531149.10001.131900.00000 Version: 4.02.R11.C6380171.11201.141900.00000 Version: 4.03.R11.0000020X.11201.042300.0000005 Version: 4.03.R11.4912720B.11201.142300.0000004 Version: 4.03.R11.4912720D.11201.142300.0000004 Version: 4.03.R11.4915714A.12201.142300.0000000 Version: 5.00.R02.00030751.10010.348717.0000000 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:20:01.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-260605 | Xiongmai AHB7804R-MH-V2 Sofia Service access control",
"tags": [
"vdb-entry",
"technical-description",
"mitigation",
"x_transferred"
],
"url": "https://vuldb.com/?id.260605"
},
{
"name": "VDB-260605 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.260605"
},
{
"name": "Submit #311903 | Xiongmai AHB7804R-MH-V2, AHB8008T-GL, AHB8004T-GL, XM530_R80X30-PQ_8M, AHB7004T-GS-V3, AHB8032F-LME, AHB7004T-MHV2 V4.03.R11.4915714A.12201.142300.0000000, V4.02.R11.A8531149.10001.131900.00000, V4.03.R11.4912720B.11201.142300.0000004, V4.03.R Incorrect A",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://vuldb.com/?submit.311903"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://github.com/netsecfish/xiongmai_incorrect_access_control"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7804r-mh-v2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8008t-gl_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8008t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8004t-gl_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8004t-gl_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:xm530_r80x30-pq_8m_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xm530_r80x30-pq_8m_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-gs-v3_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb8032f-lme_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb8032f-lme_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.03.r11.4915714a.12201.142300.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4915714a.12201.142300.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.02.r11.a8531149.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.a8531149.10001.131900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.03.r11.4912720b.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720b.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.03.r11.4912720d.11201.142300.0000004:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.4912720d.11201.142300.0000004"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:5.00.r02.00030751.10010.348717.0000000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "5.00.r02.00030751.10010.348717.0000000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.02.r11.c6380171.11201.141900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.c6380171.11201.141900.00000"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.03.r11.0000020x.11201.042300.0000005:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.03.r11.0000020x.11201.042300.0000005"
}
]
},
{
"cpes": [
"cpe:2.3:o:xiongmaitech:ahb7004t-mhv2_firmware:4.02.r11.24340142.10001.131900.00000:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ahb7004t-mhv2_firmware",
"vendor": "xiongmaitech",
"versions": [
{
"status": "affected",
"version": "4.02.r11.24340142.10001.131900.00000"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3765",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-15T13:40:05.259780Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T20:19:23.996Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Sofia Service"
],
"product": "AHB7804R-MH-V2",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
},
{
"modules": [
"Sofia Service"
],
"product": "AHB8004T-GL",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
},
{
"modules": [
"Sofia Service"
],
"product": "AHB8008T-GL",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
},
{
"modules": [
"Sofia Service"
],
"product": "AHB7004T-GS-V3",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
},
{
"modules": [
"Sofia Service"
],
"product": "AHB7004T-MHV2",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
},
{
"modules": [
"Sofia Service"
],
"product": "AHB8032F-LME",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
},
{
"modules": [
"Sofia Service"
],
"product": "XM530_R80X30-PQ_8M",
"vendor": "Xiongmai",
"versions": [
{
"status": "affected",
"version": "4.02.R11.24340142.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.A8531149.10001.131900.00000"
},
{
"status": "affected",
"version": "4.02.R11.C6380171.11201.141900.00000"
},
{
"status": "affected",
"version": "4.03.R11.0000020X.11201.042300.0000005"
},
{
"status": "affected",
"version": "4.03.R11.4912720B.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4912720D.11201.142300.0000004"
},
{
"status": "affected",
"version": "4.03.R11.4915714A.12201.142300.0000000"
},
{
"status": "affected",
"version": "5.00.R02.00030751.10010.348717.0000000"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "netsecfish (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M. Affected by this vulnerability is an unknown functionality of the component Sofia Service. The manipulation with the input ff00000000000000000000000000f103250000007b202252657422203a203130302c202253657373696f6e494422203a202230783022207d0a leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260605 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M wurde eine kritische Schwachstelle entdeckt. Es geht um eine nicht n\u00e4her bekannte Funktion der Komponente Sofia Service. Durch Manipulation mit der Eingabe ff00000000000000000000000000f103250000007b202252657422203a203130302c202253657373696f6e494422203a202230783022207d0a mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 10,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Controls",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-14T23:00:05.199Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-260605 | Xiongmai AHB7804R-MH-V2 Sofia Service access control",
"tags": [
"vdb-entry",
"technical-description",
"mitigation"
],
"url": "https://vuldb.com/?id.260605"
},
{
"name": "VDB-260605 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.260605"
},
{
"name": "Submit #311903 | Xiongmai AHB7804R-MH-V2, AHB8008T-GL, AHB8004T-GL, XM530_R80X30-PQ_8M, AHB7004T-GS-V3, AHB8032F-LME, AHB7004T-MHV2 V4.03.R11.4915714A.12201.142300.0000000, V4.02.R11.A8531149.10001.131900.00000, V4.03.R11.4912720B.11201.142300.0000004, V4.03.R Incorrect A",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.311903"
},
{
"tags": [
"related"
],
"url": "https://github.com/netsecfish/xiongmai_incorrect_access_control"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-14T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-14T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-14T10:50:01.000Z",
"value": "VulDB entry last update"
}
],
"title": "Xiongmai AHB7804R-MH-V2 Sofia Service access control"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3765",
"datePublished": "2024-04-14T23:00:05.199Z",
"dateReserved": "2024-04-14T08:43:42.949Z",
"dateUpdated": "2024-08-08T20:19:23.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}