First published: Mon Nov 04 2019(Updated: )
A command injection vulnerability exists when the authorized user passes crafted parameter to background process in the router. This affects 360 router series products (360 Safe Router P0,P1,P2,P3,P4), the affected version is V2.0.61.58897.
Credit: security@360.cn
Affected Software | Affected Version | How to fix |
---|---|---|
360 Safe Router P0 | =2.0.61.58897 | |
360 Safe Router P0 Firmware | ||
360 Safe Router P1 | =2.0.61.58897 | |
360 Safe Router P1 Firmware | ||
360 Safe Router P2 | =2.0.61.58897 | |
360 Safe Router P2 Firmware | ||
360 Safe Router P3 Firmware | =2.0.61.58897 | |
360 Safe Router P3 Firmware | ||
360 Safe Router P4 | =2.0.61.58897 | |
360 Safe Router P4 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19031 is classified as a high severity command injection vulnerability.
To fix CVE-2018-19031, update the affected 360 Safe Router firmware to a version above 2.0.61.58897.
CVE-2018-19031 affects the 360 Safe Router P0, P1, P2, P3, and P4 models with firmware version 2.0.61.58897.
Authorized users of the affected 360 Safe Router models may be impacted by CVE-2018-19031.
CVE-2018-19031 is a command injection vulnerability that occurs when crafted parameters are passed to a background process in the router.