Xiaomi Mi A3 Phone

Platform Information https://www.mi.com/global/mi-a3/specs/
Search Engine Search on Google
Type Mobile Device
End of Sales -
End of Life -
Wired Connection -
Wireless Connection Yes
Fingerprinting Source BROWSER MAC OUI NIC VENDOR
Added at
Manufacturer Name Xiaomi
Homepage http://www.mi.com/en/
Headquarters China
Business Status Ongoing


Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2019-15475
11/14/2019

LOW
2.1
The Xiaomi Mi A3 Android device with a build fingerprint of xiaomi/onc_eea/onc:9/PKQ1.181021.001/V10.2.8.0.PFLEUXM:user/release-keys contains a pre-installed app with a package name of com.qualcomm.qti.callenhancement app (versionCode=28, versionName=9) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record telephone calls to external storage.

Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2020-11961
06/24/2020
HIGH
7.5
MEDIUM
5
Xiaomi router R3600 ROM before 1.0.50 is affected by a sensitive information leakage caused by an insecure interface get_config_result without authentication
CVE-2020-11960
06/24/2020
CRITICAL
9.8
HIGH
7.5
Xiaomi router R3600 ROM before 1.0.50 is affected by a vulnerability when checking backup file in c_upload interface let attacker able to extract malicious file under any location in /tmp, lead to possible RCE and DoS
CVE-2020-11959
06/24/2020
HIGH
7.5
MEDIUM
5
An unsafe configuration of nginx lead to information leak in Xiaomi router R3600 ROM before 1.0.50.
CVE-2020-10561
06/24/2020
CRITICAL
9.8
HIGH
7.5
An issue was discovered on Xiaomi Mi Jia ink-jet printer < 3.4.6_0138. Injecting parameters to ippserver through the web management background, resulting in command execution vulnerabilities.
CVE-2020-14095
06/24/2020
CRITICAL
9.8
HIGH
7.5
In Xiaomi router R3600, ROM version<1.0.20, a connect service suffers from an injection vulnerability through the web interface, leading to a stack overflow or remote code execution.



Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms