Description
In the 3.1.3.64296 and lower version of 360F5, the third party can trigger the device to send a deauth frame by constructing and sending a specific illegal 802.11 Null Data Frame, which will cause other wireless terminals connected to disconnect from the wireless, so as to attack the router wireless by DoS. At present, the vulnerability has been effectively handled, and users can fix the vulnerability after updating the firmware version.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13044 | In the 3.1.3.64296 and lower version of 360F5, the third party can trigger the device to send a deauth frame by constructing and sending a specific illegal 802.11 Null Data Frame, which will cause other wireless terminals connected to disconnect from the wireless, so as to attack the router wireless by DoS. At present, the vulnerability has been effectively handled, and users can fix the vulnerability after updating the firmware version. |
References
| Link | Providers |
|---|---|
| https://security.360.cn/News/news/id/246 |
|
History
No history.
Status: PUBLISHED
Assigner: 360ST
Published:
Updated: 2024-08-04T19:12:08.565Z
Reserved: 2018-12-19T00:00:00.000Z
Link: CVE-2019-3405
No data.
Status : Modified
Published: 2021-01-11T16:15:14.350
Modified: 2024-11-21T04:42:02.567
Link: CVE-2019-3405
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD