LG Q60 Phone

Platform Information https://www.lg.com/uk/mobile-phones/lg-LMX525EAW
Search Engine Search on Google
End of Sales -
End of Support -
Wired Connection -
Wireless Connection Yes
Fingerprinting Source BROWSER MAC OUI NIC VENDOR DHCP
Added at Nov 05, 2019
Manufacturer Name LG Electronics
Homepage http://www.lg.com/global
Headquarters Korea (Republic of)
Business Status Ongoing

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
No records found.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2018-14839
05/14/2019
CRITICAL
HIGH
LG N1A1 NAS 3718.510 is affected by: Remote Command Execution. The impact is: execute arbitrary code (remote). The attack vector is: HTTP POST with parameters.
CVE-2019-7404
05/13/2019
HIGH
MEDIUM
An issue was discovered on LG GAMP-7100, GAPM-7200, and GAPM-8000 routers. An unauthenticated user can read a log file via an HTTP request containing its full pathname, such as http://192.168.0.1/var/gapm7100_${today's_date}.log for reading a filename such as gapm7100_190101.log.
CVE-2019-8372
02/18/2019
HIGH
MEDIUM
The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL.
CVE-2018-17173
09/21/2018
CRITICAL
HIGH
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
CVE-2018-16706
09/14/2018
HIGH
HIGH
LG SuperSign CMS allows TVs to be rebooted remotely without authentication via a direct HTTP request to /qsr_server/device/reboot on port 9080.