ID

VAR-202007-0512


CVE

CVE-2019-15311


TITLE

Linkplay Inadequate protection of credentials in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2019-015771

DESCRIPTION

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities. Linkplay There is a vulnerability in the firmware regarding insufficient protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Anker Zolo Halo is a smart speaker from Anker Company in the Philippines. Linkplay firmware is an application software. Provide a turnkey solution including software, voice, Wi-Fi, Bluetooth IoT/thin client modules, leading voice assistant services (such as Amazon Alexa and many popular international voice assistant services) and integration into a central mobile application Global streaming content in the program to enable smart, voice-enabled, and IoT products. There are security vulnerabilities in Linkplay firmware. Attackers can use this vulnerability to execute code

Trust: 2.7

sources: NVD: CVE-2019-15311 // JVNDB: JVNDB-2019-015771 // CNVD: CNVD-2021-18051 // CNNVD: CNNVD-202007-094

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

category:['wearable device']sub_category:smart speaker

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2021-18051

AFFECTED PRODUCTS

vendor:linkplaymodel:linkplayscope:eqversion: -

Trust: 1.0

vendor:linkplaymodel:linkplayscope:eqversion:linkplay

Trust: 0.8

vendor:ankermodel:linkplayscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-18051 // JVNDB: JVNDB-2019-015771 // NVD: CVE-2019-15311

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-15311
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2019-015771
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-18051
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202007-094
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2019-15311
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-015771
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-18051
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-15311
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2019-015771
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-18051 // JVNDB: JVNDB-2019-015771 // CNNVD: CNNVD-202007-094 // NVD: CVE-2019-15311

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-522

Trust: 0.8

sources: JVNDB: JVNDB-2019-015771 // NVD: CVE-2019-15311

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-094

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202007-094

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-015771

PATCH

title:Linkplayurl:https://linkplay.com/featured-products/

Trust: 0.8

sources: JVNDB: JVNDB-2019-015771

EXTERNAL IDS

db:NVDid:CVE-2019-15311

Trust: 3.1

db:JVNDBid:JVNDB-2019-015771

Trust: 0.8

db:CNVDid:CNVD-2021-18051

Trust: 0.6

db:CNNVDid:CNNVD-202007-094

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2021-18051 // JVNDB: JVNDB-2019-015771 // CNNVD: CNNVD-202007-094 // NVD: CVE-2019-15311

REFERENCES

url:https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/

Trust: 2.4

url:https://linkplay.com/featured-products/

Trust: 1.6

url:https://labs.mwrinfosecurity.com/advisories/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-15311

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15311

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2019-015771 // CNNVD: CNNVD-202007-094 // NVD: CVE-2019-15311

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2021-18051
db:JVNDBid:JVNDB-2019-015771
db:CNNVDid:CNNVD-202007-094
db:NVDid:CVE-2019-15311

LAST UPDATE DATE

2025-01-30T20:19:34.244000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-18051date:2021-03-17T00:00:00
db:JVNDBid:JVNDB-2019-015771date:2020-08-27T00:00:00
db:CNNVDid:CNNVD-202007-094date:2021-07-13T00:00:00
db:NVDid:CVE-2019-15311date:2024-11-21T04:28:25.500

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-18051date:2021-03-17T00:00:00
db:JVNDBid:JVNDB-2019-015771date:2020-08-27T00:00:00
db:CNNVDid:CNNVD-202007-094date:2020-07-01T00:00:00
db:NVDid:CVE-2019-15311date:2020-07-01T20:15:10.860