Motorola Moto G7 Power Phone

Platform Information https://www.motorola.com/us/products/moto-g-power-gen-7
Search Engine Search on Google
End of Sales -
End of Support -
Wired Connection -
Wireless Connection Yes
Fingerprinting Source BROWSER MAC OUI NIC VENDOR
Added at Nov 05, 2019
Manufacturer Name Motorola Mobility LLC
Homepage https://www.motorola.com/us/home
Headquarters United States of America
Business Status Ongoing
Acquisition Company Lenovo more info
Acquisition Company Homepage https://www.lenovo.com/us/en/

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
No records found.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2019-16257
09/12/2019
HIGH
Some Motorola devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
CVE-2019-15513
08/23/2019
HIGH
HIGH
An issue was discovered in OpenWrt libuci (aka Library for the Unified Configuration Interface) as used on Motorola CX2L MWR04L 1.01 and C1 MWR03 1.01 devices. /tmp/.uci/network locking is mishandled after reception of a long SetWanSettings command, leading to a device hang.
CVE-2019-13129
07/01/2019
HIGH
HIGH
On the Motorola router CX2L MWR04L 1.01, there is a stack consumption (infinite recursion) issue in scopd via TCP port 8010 and UDP port 8080. It is caused by snprintf and inappropriate length handling.
CVE-2019-12297
05/23/2019
CRITICAL
HIGH
An issue was discovered in scopd on Motorola routers CX2 1.01 and M2 1.01. There is a Use of an Externally Controlled Format String, reachable via TCP port 8010 or UDP port 8080.
CVE-2019-11322
04/18/2019
CRITICAL
HIGH
An issue was discovered in Motorola CX2 1.01 and M2 1.01. There is a command injection in the function startRmtAssist in hnap, which leads to remote code execution via shell metacharacters in a JSON value.