Vulnerability Database

328,409

Total vulnerabilities in the database

CVE-2018-7907

Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.

  • Published: Sep 26, 2018
  • Updated: Nov 9, 2025
  • CVE: CVE-2018-7907
  • Severity: Low
  • Exploit:

CVSS v2:

  • Severity: Low
  • Score: 4.3
  • AV:N/AC:M/Au:N/C:P/I:N/A:N

CWEs:

Software From Fixed in
huawei / agassi-l09_firmware ags-l09c100b257custc100d001 ags-l09c100b257custc100d001.x
huawei / agassi-l09_firmware ags-l09c170b253custc170d001 ags-l09c170b253custc170d001.x
huawei / agassi-l09_firmware ags-l09c199b251custc199d001 ags-l09c199b251custc199d001.x
huawei / agassi-l09_firmware ags-l09c229b003custc229d001 ags-l09c229b003custc229d001.x
huawei / agassi-w09_firmware ags-w09c100b257custc100d001 ags-w09c100b257custc100d001.x
huawei / agassi-w09_firmware ags-w09c128b252custc128d001 ags-w09c128b252custc128d001.x
huawei / agassi-w09_firmware ags-w09c170b252custc170d001 ags-w09c170b252custc170d001.x
huawei / agassi-w09_firmware ags-w09c229b251custc229d001 ags-w09c229b251custc229d001.x
huawei / agassi-w09_firmware ags-w09c331b003custc331d001 ags-w09c331b003custc331d001.x
huawei / agassi-w09_firmware ags-w09c794b001custc794d001 ags-w09c794b001custc794d001.x
huawei / baggio2-u01a_firmware bg2-u01c100b160custc100d001 bg2-u01c100b160custc100d001.x
huawei / baggio2-u01a_firmware bg2-u01c170b160custc170d001 bg2-u01c170b160custc170d001.x
huawei / baggio2-u01a_firmware bg2-u01c199b162custc199d001 bg2-u01c199b162custc199d001.x
huawei / baggio2-u01a_firmware bg2-u01c209b160custc209d001 bg2-u01c209b160custc209d001.x
huawei / baggio2-u01a_firmware bg2-u01c333b160custc333d001 bg2-u01c333b160custc333d001.x
huawei / bond-al00c_firmware bond-al00cc00b201 bond-al00cc00b201.x
huawei / bond-al10b_firmware bond-al10bc00b201 bond-al10bc00b201.x
huawei / bond-tl10b_firmware bond-tl10bc01b201 bond-tl10bc01b201.x
huawei / bond-tl10c_firmware bond-tl10cc01b131 bond-tl10cc01b131.x
huawei / haydn-l1jb_firmware hdn-l1jc137b068 hdn-l1jc137b068.x
huawei / kobe-l09a_firmware kob-l09c100b252custc100d001 kob-l09c100b252custc100d001.x
huawei / kobe-l09a_firmware kob-l09c209b002custc209d001 kob-l09c209b002custc209d001.x
huawei / kobe-l09a_firmware kob-l09c362b001custc362d001 kob-l09c362b001custc362d001.x
huawei / kobe-l09ahn_firmware kob-l09c233b226 kob-l09c233b226.x
huawei / kobe-w09c_firmware kob-w09c128b251custc128d001 kob-w09c128b251custc128d001.x
huawei / lelandp-l22c_firmware 8.0.0.101_c675custc675d2 8.0.0.101_c675custc675d2.x
huawei / lelandp-l22d_firmware 8.0.0.101_c675custc675d2 8.0.0.101_c675custc675d2.x
huawei / rhone-al00_firmware rhone-al00c00b186 rhone-al00c00b186.x
huawei / selina-l02_firmware selina-l02c432b153 selina-l02c432b153.x
huawei / stanford-l09s_firmware stanford-l09sc432b183 stanford-l09sc432b183.x
huawei / toronto-al00_firmware toronto-al00c00b223 toronto-al00c00b223.x
huawei / toronto-al00a_firmware toronto-al00ac00b223 toronto-al00ac00b223.x
huawei / toronto-tl10_firmware toronto-tl10c01b223 toronto-tl10c01b223.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.