Vulnerability Description
An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mi | Millet Router 3G Firmware | < 2.28.23 |
| Mi | Millet Router 3G | - |
Related Weaknesses (CWE)
References
- https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/masterExploitThird Party Advisory
- https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/masterExploitThird Party Advisory
FAQ
What is CVE-2019-18371?
CVE-2019-18371 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by ap...
How severe is CVE-2019-18371?
CVE-2019-18371 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18371?
Check the references section above for vendor advisories and patch information. Affected products include: Mi Millet Router 3G Firmware, Mi Millet Router 3G.