Vulnerabilities (CVE)

Filtered by vendor Zte Subscribe
Total 173 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-39075 1 Zte 34 Axon 40 Ultra, Axon 40 Ultra Firmware, Blade A31 and 31 more 2025-01-13 N/A 7.1 HIGH
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission.
CVE-2022-39071 1 Zte 34 Axon 40 Ultra, Axon 40 Ultra Firmware, Blade A31 and 31 more 2025-01-13 N/A 7.1 HIGH
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission.
CVE-2023-25645 1 Zte 10 Up T2 4k, Up T2 4k Firmware, Zxv10 B860h V5d0 and 7 more 2024-12-12 N/A 7.7 HIGH
There is a permission and access control vulnerability in some ZTE AndroidTV STBs. Due to improper permission settings, non-privileged application can perform functions that are protected with signature/privilege-level permissions. Exploitation of this vulnerability could clear personal data and applications on the user's device, affecting device operation.
CVE-2024-22066 1 Zte 8 Zxr10 160, Zxr10 160 Firmware, Zxr10 1800-2s and 5 more 2024-11-08 N/A 6.5 MEDIUM
There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 intelligent multi service router . An authenticated attacker could use the vulnerability to obtain sensitive information about the device.
CVE-2024-10119 1 Zte 2 Wrtm326, Wrtm326 Firmware 2024-11-01 N/A 9.8 CRITICAL
The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests.
CVE-2022-39068 1 Zte 2 Mf296r, Mf296r Firmware 2024-09-29 N/A 6.5 MEDIUM
There is a buffer overflow vulnerability in ZTE MF296R. Due to insufficient validation of the SMS parameter length, an authenticated attacker could use the vulnerability to perform a denial of service attack.
CVE-2024-22069 1 Zte 4 Zxv10 Et301, Zxv10 Et301 Firmware, Zxv10 Xt802 and 1 more 2024-08-20 N/A 8.8 HIGH
There is a permission and access control vulnerability of ZTE's ZXV10 XT802/ET301 product.Attackers with common permissions can log in the terminal web and change the password of the administrator illegally by intercepting requests to change the passwords.
CVE-2020-12695 21 Asus, Broadcom, Canon and 18 more 217 Rt-n11, Adsl, Selphy Cp1200 and 214 more 2024-04-08 7.8 HIGH 7.5 HIGH
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
CVE-2023-41784 1 Zte 2 Redmagic 8 Pro, Redmagic 8 Pro Firmware 2024-02-28 N/A 5.5 MEDIUM
Permissions and Access Control Vulnerability in ZTE Red Magic 8 Pro
CVE-2023-41781 1 Zte 2 Mf258, Mf258 Firmware 2024-01-17 N/A 6.1 MEDIUM
There is a Cross-site scripting (XSS)  vulnerability in ZTE MF258. Due to insufficient input validation of SMS interface parameter, an XSS attack will be triggered.
CVE-2023-25651 1 Zte 4 Mf286r, Mf286r Firmware, Mf833u1 and 1 more 2023-12-19 N/A 8.0 HIGH
There is a SQL injection vulnerability in some ZTE mobile internet products. Due to insufficient input validation of SMS interface parameter, an authenticated attacker could use the vulnerability to execute SQL injection and cause information leak.
CVE-2023-25643 1 Zte 4 Mc801a, Mc801a1, Mc801a1 Firmware and 1 more 2023-12-18 N/A 8.8 HIGH
There is a command injection vulnerability in some ZTE mobile internet products. Due to insufficient input validation of multiple network parameters, an authenticated attacker could use the vulnerability to execute arbitrary commands.
CVE-2023-25642 1 Zte 4 Mc801a, Mc801a1, Mc801a1 Firmware and 1 more 2023-12-18 N/A 6.5 MEDIUM
There is a buffer overflow vulnerability in some ZTE mobile internet producsts. Due to insufficient validation of tcp port parameter, an authenticated attacker could use the vulnerability to perform a denial of service attack. 
CVE-2023-25644 1 Zte 4 Mc801a, Mc801a1, Mc801a1 Firmware and 1 more 2023-12-18 N/A 7.5 HIGH
There is a denial of service vulnerability in some ZTE mobile internet products. Due to insufficient validation of Web interface parameter, an attacker could use the vulnerability to perform a denial of service attack.
CVE-2012-2949 2 Google, Zte 2 Android, Score M 2023-11-07 10.0 HIGH N/A
The ZTE sync_agent program for Android 2.3.4 on the Score M device uses a hardcoded ztex1609523 password to control access to commands, which allows remote attackers to gain privileges via a crafted application.
CVE-2023-25647 1 Zte 8 Axon 30, Axon 30 Firmware, Axon 40 Pro and 5 more 2023-08-24 N/A 3.3 LOW
There is a permission and access control vulnerability in some ZTE mobile phones. Due to improper access control, applications in mobile phone could monitor the touch event.
CVE-2021-21751 1 Zte 1 Zxin10 Cms 2023-08-08 5.5 MEDIUM 8.1 HIGH
ZTE BigVideo analysis product has an input verification vulnerability. Due to the inconsistency between the front and back verifications when configuring the large screen page, an attacker with high privileges could exploit this vulnerability to tamper with the URL and cause service exception.
CVE-2022-23142 1 Zte 2 Zxen Cg200, Zxen Cg200 Firmware 2023-08-08 N/A 5.3 MEDIUM
ZXEN CG200 has a DoS vulnerability. An attacker could construct and send a large number of HTTP GET requests in a short time, which can make the product management websites not accessible.
CVE-2021-21741 1 Zte 2 Zxv10 M910, Zxv10 M910 Firmware 2023-06-05 7.5 HIGH 9.8 CRITICAL
There is a command execution vulnerability in a ZTE conference management system. As some services are enabled by default, the attacker could exploit this vulnerability to execute arbitrary commands by sending specific serialization command.
CVE-2019-3417 1 Zte 2 Zxhn F670, Zxhn F670 Firmware 2023-03-03 9.0 HIGH 8.8 HIGH
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by command injection vulnerability. Due to insufficient parameter validation check, an authorized user can exploit this vulnerability to take control of user router system.