Vulnerabilites related to zte - zxv10_w300
cve-2014-4018
Vulnerability from cvelistv5
Published
2014-07-16 14:00
Modified
2024-08-06 11:04
Severity ?
EPSS score ?
Summary
The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html | x_refsource_MISC | |
https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ | x_refsource_MISC | |
http://www.exploit-db.com/exploits/33803 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:04:27.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "33803", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/33803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-16T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "33803", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/33803" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "name": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/", "refsource": "MISC", "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "33803", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/33803" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4018", "datePublished": "2014-07-16T14:00:00", "dateReserved": "2014-06-11T00:00:00", "dateUpdated": "2024-08-06T11:04:27.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7258
Vulnerability from cvelistv5
Published
2017-08-24 20:00
Modified
2024-08-06 07:43
Severity ?
EPSS score ?
Summary
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/38772/ | exploit, x_refsource_EXPLOIT-DB | |
http://seclists.org/fulldisclosure/2015/Nov/48 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:46.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38772", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-24T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "38772", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-7258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38772", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "name": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "name": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-7258", "datePublished": "2017-08-24T20:00:00", "dateReserved": "2015-09-18T00:00:00", "dateUpdated": "2024-08-06T07:43:46.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4155
Vulnerability from cvelistv5
Published
2014-06-19 14:00
Modified
2024-08-06 11:04
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to Forms/tools_admin_1.
References
▼ | URL | Tags |
---|---|---|
https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities | x_refsource_MISC | |
http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html | x_refsource_MISC | |
http://www.exploit-db.com/exploits/33803 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:04:28.734Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "name": "33803", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/33803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to Forms/tools_admin_1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-16T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "name": "33803", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/33803" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to Forms/tools_admin_1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities", "refsource": "MISC", "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities" }, { "name": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "name": "33803", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/33803" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4155", "datePublished": "2014-06-19T14:00:00", "dateReserved": "2014-06-12T00:00:00", "dateUpdated": "2024-08-06T11:04:28.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8703
Vulnerability from cvelistv5
Published
2015-12-30 02:00
Modified
2024-08-06 08:29
Severity ?
EPSS score ?
Summary
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/77421 | vdb-entry, x_refsource_BID | |
https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA | x_refsource_CONFIRM | |
https://www.kb.cert.org/vuls/id/391604 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:21.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "77421", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77421" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA" }, { "name": "VU#391604", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/391604" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "77421", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77421" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA" }, { "name": "VU#391604", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/391604" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-8703", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "77421", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77421" }, { "name": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA", "refsource": "CONFIRM", "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA" }, { "name": "VU#391604", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/391604" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-8703", "datePublished": "2015-12-30T02:00:00", "dateReserved": "2015-12-29T00:00:00", "dateUpdated": "2024-08-06T08:29:21.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4019
Vulnerability from cvelistv5
Published
2020-02-20 17:27
Modified
2024-08-06 11:04
Severity ?
EPSS score ?
Summary
ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html | x_refsource_MISC | |
https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ | x_refsource_MISC | |
http://www.exploit-db.com/exploits/33803 | x_refsource_MISC | |
http://www.osvdb.org/102668 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:04:27.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.osvdb.org/102668" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-15T00:00:00", "descriptions": [ { "lang": "en", "value": "ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-20T17:27:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.osvdb.org/102668" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "name": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/", "refsource": "MISC", "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "http://www.exploit-db.com/exploits/33803", "refsource": "MISC", "url": "http://www.exploit-db.com/exploits/33803" }, { "name": "http://www.osvdb.org/102668", "refsource": "MISC", "url": "http://www.osvdb.org/102668" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4019", "datePublished": "2020-02-20T17:27:39", "dateReserved": "2014-06-11T00:00:00", "dateUpdated": "2024-08-06T11:04:27.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0329
Vulnerability from cvelistv5
Published
2014-02-04 02:00
Modified
2024-08-06 09:13
Severity ?
EPSS score ?
Summary
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/228886 | third-party-advisory, x_refsource_CERT-VN | |
http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90958 | vdb-entry, x_refsource_XF | |
http://osvdb.org/102816 | vdb-entry, x_refsource_OSVDB | |
http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/65310 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:13:10.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#228886", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/228886" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html" }, { "name": "zxv10-w300-cve20140329-sec-bypass(90958)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90958" }, { "name": "102816", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102816" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html" }, { "name": "65310", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#228886", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/228886" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html" }, { "name": "zxv10-w300-cve20140329-sec-bypass(90958)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90958" }, { "name": "102816", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102816" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html" }, { "name": "65310", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65310" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2014-0329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#228886", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/228886" }, { "name": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html" }, { "name": "zxv10-w300-cve20140329-sec-bypass(90958)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90958" }, { "name": "102816", "refsource": "OSVDB", "url": "http://osvdb.org/102816" }, { "name": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html", "refsource": "MISC", "url": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html" }, { "name": "65310", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65310" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2014-0329", "datePublished": "2014-02-04T02:00:00", "dateReserved": "2013-12-05T00:00:00", "dateUpdated": "2024-08-06T09:13:10.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7259
Vulnerability from cvelistv5
Published
2017-08-24 20:00
Modified
2024-08-06 07:43
Severity ?
EPSS score ?
Summary
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/38772/ | exploit, x_refsource_EXPLOIT-DB | |
http://seclists.org/fulldisclosure/2015/Nov/48 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:46.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38772", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-24T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "38772", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-7259", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38772", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "name": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "name": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-7259", "datePublished": "2017-08-24T20:00:00", "dateReserved": "2015-09-18T00:00:00", "dateUpdated": "2024-08-06T07:43:46.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7257
Vulnerability from cvelistv5
Published
2017-08-24 20:00
Modified
2024-08-06 07:43
Severity ?
EPSS score ?
Summary
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated non-administrator users to change the admin password by intercepting an outgoing password change request, and changing the username parameter from "support" to "admin".
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/38772/ | exploit, x_refsource_EXPLOIT-DB | |
http://seclists.org/fulldisclosure/2015/Nov/48 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:46.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38772", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated non-administrator users to change the admin password by intercepting an outgoing password change request, and changing the username parameter from \"support\" to \"admin\"." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-24T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "38772", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-7257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated non-administrator users to change the admin password by intercepting an outgoing password change request, and changing the username parameter from \"support\" to \"admin\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38772", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/38772/" }, { "name": "20151114 ZTE ADSL modems - Multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "name": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "name": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-7257", "datePublished": "2017-08-24T20:00:00", "dateReserved": "2015-09-18T00:00:00", "dateUpdated": "2024-08-06T07:43:46.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12695
Vulnerability from cvelistv5
Published
2020-06-08 16:45
Modified
2024-08-04 12:04
Severity ?
EPSS score ?
Summary
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:04:22.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.callstranger.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "name": "[oss-security] 20200608 hostapd: UPnP SUBSCRIBE misbehavior in hostapd WPS AP", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/corelight/callstranger-detector" }, { "name": "FEDORA-2020-df3e1cfde9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "name": "FEDORA-2020-1f7fc0d0c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "name": "FEDORA-2020-e538e3e526", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "name": "[debian-lts-announce] 20200806 [SECURITY] [DLA 2315-1] gupnp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "name": "[debian-lts-announce] 20200808 [SECURITY] [DLA 2318-1] wpa security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "name": "USN-4494-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "name": "DSA-4806", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2489-1] minidlna security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "name": "DSA-4898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4898" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T23:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.callstranger.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "name": "[oss-security] 20200608 hostapd: UPnP SUBSCRIBE misbehavior in hostapd WPS AP", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/corelight/callstranger-detector" }, { "name": "FEDORA-2020-df3e1cfde9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "name": "FEDORA-2020-1f7fc0d0c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "name": "FEDORA-2020-e538e3e526", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "name": "[debian-lts-announce] 20200806 [SECURITY] [DLA 2315-1] gupnp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "name": "[debian-lts-announce] 20200808 [SECURITY] [DLA 2318-1] wpa security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "name": "USN-4494-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "name": "DSA-4806", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2489-1] minidlna security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "name": "DSA-4898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4898" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12695", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.callstranger.com", "refsource": "MISC", "url": "https://www.callstranger.com" }, { "name": "https://www.kb.cert.org/vuls/id/339275", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/339275" }, { "name": "[oss-security] 20200608 hostapd: UPnP SUBSCRIBE misbehavior in hostapd WPS AP", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "name": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of", "refsource": "MISC", "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "name": "https://github.com/yunuscadirci/CallStranger", "refsource": "MISC", "url": "https://github.com/yunuscadirci/CallStranger" }, { "name": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "name": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/", "refsource": "MISC", "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "name": "https://github.com/corelight/callstranger-detector", "refsource": "MISC", "url": "https://github.com/corelight/callstranger-detector" }, { "name": "FEDORA-2020-df3e1cfde9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "name": "FEDORA-2020-1f7fc0d0c9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "name": "FEDORA-2020-e538e3e526", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "name": "[debian-lts-announce] 20200806 [SECURITY] [DLA 2315-1] gupnp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "name": "[debian-lts-announce] 20200808 [SECURITY] [DLA 2318-1] wpa security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "name": "USN-4494-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4494-1/" }, { "name": "DSA-4806", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4806" }, { "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2489-1] minidlna security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "name": "DSA-4898", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4898" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12695", "datePublished": "2020-06-08T16:45:04", "dateReserved": "2020-05-07T00:00:00", "dateUpdated": "2024-08-04T12:04:22.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4154
Vulnerability from cvelistv5
Published
2014-07-16 14:00
Modified
2024-08-06 11:04
Severity ?
EPSS score ?
Summary
ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the PPPoE/PPPoA password via a direct request for basic/tc2wanfun.js.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html | x_refsource_MISC | |
https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ | x_refsource_MISC | |
http://www.exploit-db.com/exploits/33803 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:04:28.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "33803", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/33803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-15T00:00:00", "descriptions": [ { "lang": "en", "value": "ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the PPPoE/PPPoA password via a direct request for basic/tc2wanfun.js." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-16T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "33803", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/33803" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4154", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the PPPoE/PPPoA password via a direct request for basic/tc2wanfun.js." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "name": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/", "refsource": "MISC", "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "name": "33803", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/33803" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4154", "datePublished": "2014-07-16T14:00:00", "dateReserved": "2014-06-12T00:00:00", "dateUpdated": "2024-08-06T11:04:28.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-02-20 18:15
Modified
2024-11-21 02:09
Severity ?
Summary
ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.exploit-db.com/exploits/33803 | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.osvdb.org/102668 | Broken Link | |
cve@mitre.org | https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploit-db.com/exploits/33803 | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/102668 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | w300v1.0.0a_zrd_lk | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v1.0.0a_zrd_lk:*:*:*:*:*:*:*", "matchCriteriaId": "7170485B-C285-4528-9E36-40703F5D4E94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0." }, { "lang": "es", "value": "El enrutador ZTE ZXV10 W300 versiones de firmware W300V1.0.0a_ZRD_LK, almacena informaci\u00f3n confidencial en la web root con un control de acceso insuficiente, lo que permite a atacantes remotos leer archivos de respaldo por medio de una petici\u00f3n directa para rom-0." } ], "id": "CVE-2014-4019", "lastModified": "2024-11-21T02:09:20.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-20T18:15:11.403", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/102668" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/102668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-24 20:29
Modified
2024-11-21 02:36
Severity ?
Summary
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | w300v2.1.0f_er7_pe_o57 | |
zte | zxv10_w300 | - | |
zte | zxv10_w300_firmware | w300v2.1.0h_er7_pe_o57 | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v2.1.0f_er7_pe_o57:*:*:*:*:*:*:*", "matchCriteriaId": "1B399157-5107-4AB9-AB62-3FCB6858BB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v2.1.0h_er7_pe_o57:*:*:*:*:*:*:*", "matchCriteriaId": "BA81EABD-FA3A-4F33-AF32-E1C04303E735", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs." }, { "lang": "es", "value": "Los modems ZTE ADSL ZXV10 W300, W300V2.1.0f_ER7_PE_O57 y W300V2.1.0h_ER7_PE_O57 permiten que las cuentas de usuario tengan m\u00faltiples pares v\u00e1lidos de nombre de usuario y contrase\u00f1a, lo que permite que usuarios remotos autenticados inicien sesi\u00f3n en una cuenta objetivo mediante cualquiera de sus pares de nombre de usuario y contrase\u00f1a." } ], "id": "CVE-2015-7259", "lastModified": "2024-11-21T02:36:27.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-24T20:29:00.473", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/38772/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-24 20:29
Modified
2024-11-21 02:36
Severity ?
Summary
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated non-administrator users to change the admin password by intercepting an outgoing password change request, and changing the username parameter from "support" to "admin".
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | w300v2.1.0f_er7_pe_o57 | |
zte | zxv10_w300 | - | |
zte | zxv10_w300_firmware | w300v2.1.0h_er7_pe_o57 | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v2.1.0f_er7_pe_o57:*:*:*:*:*:*:*", "matchCriteriaId": "1B399157-5107-4AB9-AB62-3FCB6858BB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v2.1.0h_er7_pe_o57:*:*:*:*:*:*:*", "matchCriteriaId": "BA81EABD-FA3A-4F33-AF32-E1C04303E735", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated non-administrator users to change the admin password by intercepting an outgoing password change request, and changing the username parameter from \"support\" to \"admin\"." }, { "lang": "es", "value": "Los modems ZTE ADSL ZXV10 W300, W300V2.1.0f_ER7_PE_O57 y W300V2.1.0h_ER7_PE_O57 permiten que usuarios sin privilegio de administrador, autenticados y remotos cambien la contrase\u00f1a de administrador interceptando una petici\u00f3n saliente de cambio de contrase\u00f1a y cambiando el par\u00e1metro username de \"support\" a \"admin\"." } ], "id": "CVE-2015-7257", "lastModified": "2024-11-21T02:36:27.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-24T20:29:00.393", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/38772/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-08 17:15
Modified
2024-11-21 05:00
Severity ?
Summary
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9EAF0BA-0F00-4EC3-8AD1-38798E302EDF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*", "matchCriteriaId": "96FB9DD1-0AD3-422E-BE39-36D16B259BB3", "versionEndExcluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E4A59C5-BD20-4EF8-BB18-E3EC2AFAB02F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*", "matchCriteriaId": "5324C118-FC2A-4701-A2D4-B149B6F8D82B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "27493F05-2B86-41C9-90F3-29ED4621989F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3B7126-28E1-42F8-98CF-0EC156BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB01CB7-C5BB-49D6-85A7-CECED514C7CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9917176-E908-4110-A641-FED1DFF41C43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE29D9CF-0D42-4C02-8300-364DD9D87553", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADBAEC-12BB-40FB-B013-9E66B7849FE7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A29F002-A941-44B1-9CD3-CC239DCBC1EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA722A34-5071-41A6-8C94-10719DCB0A80", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5772EE0-AAFE-4E11-BE24-05839353E89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FCFF0E3-1CA8-4676-9152-0F9B7E0DAF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1EBF0A-5E1B-4B26-97C3-08EFFECD4941", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BD48DC-F9D7-4377-9E08-93AB0416570D", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDD52F9F-7715-424A-B0CD-923507C3AB31", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE9A1753-C59A-447F-9396-F3B4284112DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC93844-D227-42B7-AE09-A439756773BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A52BAA-FCAB-4D01-B533-CDC2230F41B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DFAEE5-8B2C-4940-AC00-2961BC373755", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*", "matchCriteriaId": "FACBCEE3-5F3E-42B8-B6D4-3E945BC8BFD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB8F786A-C18B-4320-8B3D-2572D84BEFE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F20CDA-18E9-4AC7-BC83-0C94A184B398", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*", "matchCriteriaId": "30063847-3DAD-4485-9B38-4C0E8F928E40", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*", "matchCriteriaId": "996C8FE4-5926-4D97-A28F-E371F3AFA876", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DAAA79D-A2A0-408F-B2E0-D88C315D73DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "866A5154-8E94-41C5-8F4F-F4B322986DE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*", "matchCriteriaId": "45362946-1559-42A8-A575-C136A6732B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A17A5E-07EC-4166-BEC1-252A40A85A64", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*", "matchCriteriaId": "606660FF-DBFD-4F88-AF36-125BA4B57D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A109EFF-698F-438E-A9CA-7FDB2BB1E19D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBFA37F9-41D0-496B-B90F-1BD08A0615F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C4F2B72-03BE-49CF-85C6-405CCB0F711C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8970163-15C4-4C35-9976-E03364E6801D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9DA94DA-C428-4143-B8EB-43B8022D98A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB3E78-3AF8-4FE2-A6EC-5F8FE87078A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB98F236-726C-43B4-B391-90052354AFBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0015AA-6FC5-4AA2-8529-A09BFF2F867F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA69799-EA06-407A-92E0-7FFD2C7A9A5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3A6EAD-B58C-4C45-A63E-D4F6E47EDD37", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA924C6-7BEB-4B2A-92E0-EA3BAFA469DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3866E12-99A8-4375-B941-B5967196A392", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4539F8EF-9925-47A7-A3B8-C365B64A476B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA59F9C1-069E-450F-AEEF-8D4D9395B544", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAFD9ED4-1DB1-4150-84EC-DD6377B626E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE84F86-9EDA-47BB-8C83-A3E7505BA776", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6903ED00-1EBC-476A-ADED-650D00113193", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC732835-E3DC-46A2-AF68-0E4F48A44D2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4839445-6775-4DC6-A0F1-D8073EC083BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*", "matchCriteriaId": "99320BB7-7F19-4DF6-B9F6-D854660CFA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D258693F-EAA4-42AA-BDE2-F9F964870DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B50A1E9-B246-44A2-A002-221EAA3A3B70", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1CD0D8-F551-492B-AA36-9E1FCBA66AD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD8A8A3-B906-47D9-9BDE-68A73432F680", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D9E6BE-F3C4-4A2C-8744-976D5F79A408", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D77C54A-B051-4442-A590-C182E9594B81", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4731E44-0726-4BA4-9E0D-9DAA7FF4690C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*", "matchCriteriaId": "84988928-8254-4C49-BB9A-DCF415594E2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8604981-347C-432F-9C69-DD6ED4FB90A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*", "matchCriteriaId": "57DD4D8C-DF38-46CC-9C75-5FDC1C5828B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC111A4D-9EB2-48F8-95C3-279F5F01EFB2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97B02EA-A8CD-477E-A370-3D801EF04472", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9FF5706-AC17-4CB1-BB94-776149CB04ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35DD32C-853A-42EC-821F-9F6C0E10478F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*", "matchCriteriaId": "39035D44-8C6B-466B-8CDC-4693B1F0F1BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD3E6A5-4BE8-4DEE-8F6A-E687E0E031AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*", "matchCriteriaId": "00206EC6-40E9-44D7-91C2-DED3213BB1E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D667474F-9358-40CF-8B0F-5F31A243412E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D53C5110-F0E4-4E51-97F2-C767BCBD21C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD44558B-C4F7-49FD-AC6C-CE664B707B6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ABCA098-9BB5-4BB2-9BC2-A2F52276A7A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D70E7510-BEDA-45D1-A911-CBB6E0B5E53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5342517-0F54-4C43-9058-67E292B5BF3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF5106EA-B2DC-4674-BA84-BBD9F3B976DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "481E0DF3-C2D3-48C4-9721-7850345F36FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "46E44762-F2B9-4247-874E-8A6AED396653", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2174440D-AC3E-4D24-A561-399643CCD944", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B056A3A9-693E-4BA8-BB42-932569FC41F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*", "matchCriteriaId": "03318A78-FFFF-4431-BE9F-1171613A1014", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*", "matchCriteriaId": "021CD712-FB1B-4D30-BA64-93FD78578B50", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9633C6CB-0BA7-48B8-B4CA-96FF8E4D80D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*", "matchCriteriaId": "87BDB946-A599-4333-8DFE-B0F4E28DA9FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*", "matchCriteriaId": "47285B08-4086-495E-96B6-E56EC8E8525C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD864766-1ADF-40CA-AC4E-D8068C19362B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F85564A-E70B-4A79-8B71-08947DA20186", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D75511-E215-494D-887F-D81B837B90B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB6AD7A-D932-4C02-B2E2-D4C343796A44", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*", "matchCriteriaId": "371A5792-1442-4BE5-B639-DEBF35FF60D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7447513E-A664-49F8-BCDB-041C21E4986A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FA7CDF6-4F2F-4227-AFCF-A7B77CFDBBA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2B45C67-E822-4932-AC44-A41B40C51089", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F24EC840-1FE5-4BE2-95CD-79CA0AD521BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*", "matchCriteriaId": "83089810-0E60-4D5C-8B40-28D54E5C8121", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC960C1-BF3D-41F4-AC85-5BEF4E96F5A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*", "matchCriteriaId": "05D6ABC6-926F-4561-8196-7B0B5F39F3DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0525848-038E-447E-8A69-BDA1227947AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "42FBB9B2-69DB-495D-87D4-F313047660FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7477AAA3-FD6F-4A4F-B3C8-DCF55695991E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D024C1BF-9F18-4D5E-988D-EC1083BA0D01", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EACF115-7053-4EB6-A3F0-47D9D5D2BC8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E5BB174-2D00-4B03-9DCF-32F8A93D3EFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*", "matchCriteriaId": "998C35EB-4B53-4CB7-A0A0-5FFFEF5BD155", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*", "matchCriteriaId": "86B34CE8-A2A4-4F36-8898-138E4B0A542A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB71C71-5E10-43AB-83EA-AF5BD863163D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8A5F418-5FF5-4DB1-92DC-8C3588A10906", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*", "matchCriteriaId": "38F9056F-C3FD-4FC6-BCCD-0501BCEDB3C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3CC1275-CE6D-4C40-9F5A-F799DE82CC31", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5058889-2BCA-4EB3-8F0A-07FF682B50F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*", "matchCriteriaId": "1766FB5C-A6A1-4E61-9D34-4656A862C6F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB77C0E-1B04-4FC6-B5B0-D7FB21A29007", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F138EE5A-CCF6-4B08-8D77-1293FC6C7C58", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3879D0-F71A-45B1-8D9F-ABA4CCA07A81", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "28CF45C7-F897-4BB8-8B6D-6AEEF7B384A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C33C80-F0F4-483F-AC8C-FBA8DD82D05D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4959F00-BCCF-4C51-B476-019733E14DEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAF045C3-ED70-4913-AF9F-AF2D65DADDCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*", "matchCriteriaId": "036366B3-1FFC-4BA0-B769-EA055BC56C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*", "matchCriteriaId": "561002B2-A1BA-42C0-B81D-F3E9133FFFED", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FD7A448-9E0A-4F9D-83EA-3283AB99966A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*", "matchCriteriaId": "7969AB56-208E-432E-A8D5-DE7839492604", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*", "matchCriteriaId": "16666F94-9ED1-4616-9713-DE75F32D1421", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD41ACC2-13C6-4569-80EB-13C490A3BECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*", "matchCriteriaId": "99304D37-E10C-4123-AEB8-EF9A601D7F40", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4A6FE7-D032-4A1F-897A-D35611B3D2D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7E182D8-8E50-44CB-ACE7-FD93672EDD70", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC42C09-AC84-4D62-8C39-7482103AC14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B03E55D-88D8-4A51-8A08-2477E7FAF1F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE91E209-C794-4D54-8313-ABB3755FD69B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3944F997-DBA4-4BCB-8DB1-25C0515A4977", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DDF09AE-17F0-4423-92CC-70B0914A623B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E98A4D36-AB5F-47A3-8E7D-BB514EDA47AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDF0C02A-38C8-447E-80CF-6E020C6CB2A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE40C41-8AB9-4286-B201-1B1FD6430149", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBAA576D-B448-4ABC-B86C-BD0DDC682A95", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC07377-3C14-4E19-8695-9E6EE69D64EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*", "matchCriteriaId": "442B60FE-E431-4AEB-86D4-557D5633BD7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A3BD841-57D0-42C7-85D6-5365A7AC60F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC2A8D7F-5A2F-47D7-B60E-1AD99F34F8D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAEA384D-67F2-4261-BED4-94B9058D91FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5397B5FD-921F-476A-B5F4-F1F9A94518CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E48B3B4C-8CF0-41BB-AFD4-7D8169BCBC2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B01EB68D-D445-431C-8B7C-ED249A364A3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A36C6EBA-1B08-4F7E-BE72-2D502A37EC4E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4586D249-A8FF-4EAC-8B51-89FE59AC2960", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAAF6995-205A-46FB-B904-E8102727E414", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*", "matchCriteriaId": "18824CB2-0239-4884-9C73-B1B520348C3B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D1D9413-55BE-4A4C-AC5C-ED820E0243B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6E51D01-D179-4956-9F6B-16A4E6F7F9F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*", "matchCriteriaId": "794EF52A-832E-4951-AE3C-8C6149E42909", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "06D75EBF-1E37-486A-BC50-B991E0EA51A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1275DB-E4CB-446D-9AC4-9A02E2F4E98F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*", "matchCriteriaId": "8892CDDD-B5D4-4D10-AA40-CC29846B3F00", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*", "matchCriteriaId": "86BDA5FF-5022-44BE-92C6-5A71AAB06BA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E427C91-DF55-4D55-A650-FF35B804B6CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*", "matchCriteriaId": "623C646C-DCE6-4E2C-98CB-BAA54F41485E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B8F20D-5433-4F88-89BA-C4CD6A7EFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA5F18F4-1BE4-4518-B2D1-89FD55A0E61C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7CA908F-40A8-40BA-AF4C-467D9FB4B720", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C2B05D5-56EE-4778-A30E-2A8705760511", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A798BB4B-7F4C-4C5E-B3CC-B3BD3668F1BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB97E07-FDAF-46D2-B3F1-7F01D1B093C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B89AC8D-AACC-415C-AB42-6D7712B820EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0875F92-3E39-4958-9240-B7E2FE8601B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD8BB196-69AD-4172-A5D9-229E77A9C81C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3FB392C-FC90-45B3-B0C4-FB8762986417", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEAB5445-7A0D-48A5-B03C-65D7B809BCC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*", "matchCriteriaId": "65D3BE1C-4A96-4153-90AC-893A47B47DFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC025AAE-E85B-45E8-BA94-290097CB4B7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB506DAD-0266-49B6-93A1-1F3BCD7FEA04", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE74089E-9AAA-44BC-9A61-7A4E09789C7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*", "matchCriteriaId": "8543B3C3-0483-480A-9281-458E81A66DA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "019F45ED-891F-4C7E-9236-89F5A3F86653", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*", "matchCriteriaId": "686C6BF0-D822-4CC2-9F9D-F85AA4BBDCAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F699145A-206A-40EA-8820-46DE934E0788", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3855AF-A674-4EC1-A0E7-2A6B99A94C48", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F66C5-3054-4126-8926-94DC1432D116", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DBEA162-162B-47C1-AE5E-2B8AB7E8E020", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAA1531A-B518-4408-9254-87743147F4E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA85B6EF-330A-4C99-B355-3563623920A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFA22DA-5C42-4D55-B5D8-CB138B27544F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7D7FD2C-5799-4A72-AA5B-B1A2BADFB664", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C21D2DF-C98C-44BE-8F55-5D345266B69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8966D89-B778-4B46-B28A-1621FA910B9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2521E9E-D61F-46E4-A5DA-35AC996137C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF22F28C-AE05-46C0-A9B8-0D1272147CC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*", "matchCriteriaId": "13463F33-0D5F-4BD7-86BD-85EB0C3ED6ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF59A86-2BF5-44E7-A2E7-3958064D42DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90714920-70C8-402F-A5D0-795B69887B71", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF275372-458E-456A-94DB-0BAB5F9F15A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D183ADD-0776-4E84-8BB2-DFF427F3F666", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B26E254E-F461-42CA-BB26-5B18E2266475", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E225A758-DBDA-40F8-98A8-DD891E173B84", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE13E814-C18C-474A-BC09-F5E01EF84831", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*", "matchCriteriaId": "932FB119-04F3-459E-A414-3F7A240254F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*", "matchCriteriaId": "412A9802-E85D-4547-84B3-44E3F8DC2C18", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E65AC31-6D84-4B54-BF48-98D173185B60", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*", "matchCriteriaId": "3020F448-42AE-4ADB-B362-CD978FCA47EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5BFA2B-0B40-48D0-AE96-E18FF069524B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*", "matchCriteriaId": "78A59121-66F1-4C09-B142-B4C2F898FB3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*", "matchCriteriaId": "28459A79-756A-4E36-AC7A-BAFF63E2CC7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8CB88F-4333-4089-83C3-C45FEC7763E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B8526B-CF07-4291-9403-432CCFD5F54A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5E91F3-FD77-47E6-BBAF-E39AB288C106", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA3591F4-15BB-4DF4-A78A-95618BF8E47E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*", "matchCriteriaId": "630E70ED-A042-44AC-98D2-0D7A2D088DFF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*", "matchCriteriaId": "A92BA666-CFD5-42D6-AA64-818CC2513642", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*", "matchCriteriaId": "48AE6436-788C-46E2-9F52-9999853919E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "26C70C35-BDEA-4F58-A96B-3E24431D0F00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC86368A-7589-45FC-B9F9-E3D7175F7A96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "38C0ECB8-909F-47C9-81E5-24384D555A11", "vulnerable": true }, { "criteria": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "53C32749-82A6-42AA-9EBE-11014F161D2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*", "matchCriteriaId": "703AFCFF-7B05-43E5-9600-09431D1AD04B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue." }, { "lang": "es", "value": "La especificaci\u00f3n UPnP de Open Connectivity Foundation antes del 17-04-2020 no proh\u00edbe la aceptaci\u00f3n de una petici\u00f3n de suscripci\u00f3n con una URL de entrega en un segmento de red diferente a la URL de suscripci\u00f3n de evento totalmente calificada, tambi\u00e9n se conoce como el problema de CallStranger" } ], "id": "CVE-2020-12695", "lastModified": "2024-11-21T05:00:05.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-08T17:15:09.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/corelight/callstranger-detector" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.callstranger.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4898" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/corelight/callstranger-detector" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.callstranger.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-16 14:19
Modified
2024-11-21 02:09
Severity ?
Summary
ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the PPPoE/PPPoA password via a direct request for basic/tc2wanfun.js.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | 1.0.0a_zrd_lk | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:1.0.0a_zrd_lk:*:*:*:*:*:*:*", "matchCriteriaId": "381709EE-2324-4A1A-901D-916AFCACB78C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the PPPoE/PPPoA password via a direct request for basic/tc2wanfun.js." }, { "lang": "es", "value": "El router ZTE ZXV10 W300 con firmware W300V1.0.0a_ZRD_LK almacena informaci\u00f3n sensible en el root del web con un control de acceso insuficiente, lo que permite a atacantes remotos obtener la contrase\u00f1a PPPoE/PPPoA a trav\u00e9s de una solicitud directa para basic/tc2wanfun.js." } ], "id": "CVE-2014-4154", "lastModified": "2024-11-21T02:09:35.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-16T14:19:03.870", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-24 20:29
Modified
2024-11-21 02:36
Severity ?
Summary
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | w300v2.1.0f_er7_pe_o57 | |
zte | zxv10_w300 | - | |
zte | zxv10_w300_firmware | w300v2.1.0h_er7_pe_o57 | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v2.1.0f_er7_pe_o57:*:*:*:*:*:*:*", "matchCriteriaId": "1B399157-5107-4AB9-AB62-3FCB6858BB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:w300v2.1.0h_er7_pe_o57:*:*:*:*:*:*:*", "matchCriteriaId": "BA81EABD-FA3A-4F33-AF32-E1C04303E735", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection." }, { "lang": "es", "value": "Los modems ZTE ADSL ZXV10 W300, W300V2.1.0f_ER7_PE_O57 y W300V2.1.0h_ER7_PE_O57 permiten que usuarios remotos autenticados obtengan las contrase\u00f1as de usuario mostrando informaci\u00f3n de usuario en una conexi\u00f3n Telnet." } ], "id": "CVE-2015-7258", "lastModified": "2024-11-21T02:36:27.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-24T20:29:00.440", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/38772/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134336/ZTE-ADSL-Authorization-Bypass-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134493/ZTE-ADSL-ZXV10-W300-Authorization-Disclosure-Backdoor.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/38772/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-04 05:39
Modified
2024-11-21 02:01
Severity ?
Summary
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300 | 2.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "05FD0480-14D6-4BE0-A056-9400AC6F2666", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password." }, { "lang": "es", "value": "El servicio TELNET del router ZTE ZXV10 W300 2.1.0 tiene una contrase\u00f1a embebida terminada en aircon para la cuenta admin que permite a atacantes remotos obtener acceso administrativo conociendo los carateres de la direcci\u00f3n MAC presentes en el comienzo de la contrase\u00f1a." } ], "id": "CVE-2014-0329", "lastModified": "2024-11-21T02:01:53.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-04T05:39:08.450", "references": [ { "source": "cret@cert.org", "url": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html" }, { "source": "cret@cert.org", "url": "http://osvdb.org/102816" }, { "source": "cret@cert.org", "url": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/228886" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/65310" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/102816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/228886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90958" } ], "sourceIdentifier": "cret@cert.org", "vendorComments": [ { "comment": "According to the vulnerability found in ZTE ZXV10 W300 router version 2.1.0, a mitigation measure has been adopted in the W300 general frame structure versions after 2011, which means the ZTE ZXV10 W300 router produced since 2011 has closed the telnet default function to avoid the information security incident caused by such vulnerability. If any customer has a special requirement, please follow the instructions in our product manual to open the telnet function, but ZTE will not bear the legal liability for any security incident loss that might be the consequence of this operation. If you have any questions please contact us by calling our 24h service hotline +86-755-26770188.", "lastModified": "2014-03-13T10:13:58.487", "organization": "ZTE" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-16 14:19
Modified
2024-11-21 02:09
Severity ?
Summary
The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | 1.0.0a_zrd_lk | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:1.0.0a_zrd_lk:*:*:*:*:*:*:*", "matchCriteriaId": "381709EE-2324-4A1A-901D-916AFCACB78C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors." }, { "lang": "es", "value": "El router ZTE ZXV10 W300 con firmware W300V1.0.0a_ZRD_LK tiene una contrase\u00f1a de administraci\u00f3n por defecto para la cuenta de administraci\u00f3n, lo que facilita a atacantes remotos obtener acceso a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-4018", "lastModified": "2024-11-21T02:09:20.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-16T14:19:03.823", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-06-19 14:55
Modified
2024-11-21 02:09
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in the ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to Forms/tools_admin_1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxv10_w300_firmware | 1.0.0a_zrd_lk | |
zte | zxv10_w300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:1.0.0a_zrd_lk:*:*:*:*:*:*:*", "matchCriteriaId": "381709EE-2324-4A1A-901D-916AFCACB78C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to Forms/tools_admin_1." }, { "lang": "es", "value": "Vulnerabilidad de CSRF en el router ZTE ZXV10 W300 con firmware W300V1.0.0a_ZRD_LK permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para solicitudes que cambian la contrase\u00f1a de administraci\u00f3n a trav\u00e9s de una solicitud hacia Forms/tools_admin_1." } ], "id": "CVE-2014-4155", "lastModified": "2024-11-21T02:09:35.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-06-19T14:55:08.050", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/33803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-30 05:59
Modified
2024-11-21 02:38
Severity ?
Summary
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/77421 | ||
cret@cert.org | https://www.kb.cert.org/vuls/id/391604 | Third Party Advisory, US Government Resource | |
cret@cert.org | https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/77421 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/391604 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zte | zxhn_h108n_r1a_firmware | * | |
zte | zxhn_h108n_r1a | * | |
zte | zxv10_w300_firmware | * | |
zte | zxv10_w300 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxhn_h108n_r1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3F8294C-E254-4328-8884-C27B9F880D01", "versionEndIncluding": "zte.bhs.zxhnh108nr1a.h_pe", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxhn_h108n_r1a:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A0A9215-1F66-4A0B-BF01-0064769F6812", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zte:zxv10_w300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEAEB00D-3718-4908-869F-22BDE6C96EB3", "versionEndIncluding": "w300v1.0.0f_er1_pe", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:*:*:*:*:*:*:*:*", "matchCriteriaId": "84553EC1-5EE0-4C4B-9DD6-011B75E6D5A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248." }, { "lang": "es", "value": "Dispositivos ZTE ZXHN H108N R1A en versiones anteriores a ZTE.bhs.ZXHNH108NR1A.k_PE y dispositivos ZXV10 W300 en versiones anteriores aW300V1.0.0f_ER1_PE permiten a usuarios remotos autenticados eludir las restricciones destinadas al acceso, y descubrir credenciales y claves, leyendo el archivo de configuraci\u00f3n, una vulnerabilidad diferente a CVE-2015-7248." } ], "id": "CVE-2015-8703", "lastModified": "2024-11-21T02:38:59.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-30T05:59:14.877", "references": [ { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/77421" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/391604" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/391604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }