Huawei DP300 V500R002C00; RP200 V500R002C00; V600R006C00; TE30 V100R001C10; V600R006C00; TE50 V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00; VP9660 V500R002C10 have an DoS vulnerability due to insufficient validation of the parameter when a putty comment key is loaded. An authenticated remote attacker can place a malformed putty key file in system when a system manager load the key an infinite loop happens which lead to reboot the system.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| huawei | dp300_firmware | - | - |
| huawei | rp200_firmware | - | - |
| huawei | rp200_firmware | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
10
Affected Products
2
References
huawei / dp300_firmware
| - |
| huawei | te30_firmware | - | - |
| huawei | te30_firmware | - | - |
| huawei | te50_firmware | - | - |
| huawei | te60_firmware | - | - |
| huawei | te60_firmware | - | - |
| huawei | te60_firmware | - | - |
| huawei | vp9660_firmware | - | - |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Exploitability
Impact