Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Honor — Vulnerabilities & Security Advisories 52

Browse all 52 CVE security advisories affecting Honor. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Honor operates primarily as a consumer electronics manufacturer, producing smartphones, tablets, and wearable devices that serve as the core hardware for its ecosystem. Security audits reveal a significant history of vulnerabilities, with fifty-two CVEs currently documented, indicating persistent challenges in software integrity. Historically, common flaw classes include remote code execution, cross-site scripting, and privilege escalation, often stemming from embedded web servers and outdated cryptographic implementations. These defects frequently allow unauthorized access to sensitive user data or system control. While no single catastrophic breach has defined the brand’s public narrative, the cumulative volume of disclosed issues suggests inconsistent patch management and rigorous testing protocols. The security posture remains reactive rather than proactive, with updates often lagging behind vulnerability disclosure timelines. This pattern highlights the need for improved secure development lifecycles within the broader consumer hardware sector to mitigate long-term risks associated with connected devices.

Found 3 results / 52Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2025-57839 HONOR MagicOS 安全漏洞 — MagicOSCWE-200 4.0 Medium2025-10-20
CVE-2025-57838 HONOR MagicOS 安全漏洞 — MagicOSCWE-200 4.0 Medium2025-10-20
CVE-2024-47156 Information Leak Vulnerability in Honor Product — MagicOS 3.3 Low2024-12-26

This page lists every published CVE security advisory associated with Honor. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.