cve-2023-33778
Vulnerability from cvelistv5
Published
2023-06-01 00:00
Modified
2025-01-09 17:24
Severity ?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:47:06.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-33778",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-09T17:24:27.672008Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-798",
                "description": "CWE-798 Use of Hard-coded Credentials",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-09T17:24:35.184Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-01T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-33778",
    "datePublished": "2023-06-01T00:00:00",
    "dateReserved": "2023-05-22T00:00:00",
    "dateUpdated": "2025-01-09T17:24:35.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-33778\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-06-01T04:15:10.313\",\"lastModified\":\"2025-01-09T18:15:26.790\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.3.2\",\"matchCriteriaId\":\"FB9A5891-1058-42FE-8D36-987E967D5481\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"BCB0DEE3-60C3-49F8-9A6C-47826AFF388D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A822A86-C784-4AED-B367-4D39609D93E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB7AFBE0-9E98-4B46-9517-B73509F5944D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77DCACA0-BA44-4691-BAAD-828C54898FBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"6D6F173D-4339-4842-AC62-5E4C488D6067\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE6602CA-744E-4543-9818-75FC57E83280\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"DAB8B117-8605-4C4E-990E-7DE09DF79738\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE4BB0C-0419-4A24-9C79-4642DBF22A9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"F0604938-0253-466F-914D-300590C82AB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC2E8256-45B6-4CDC-A2A8-60303773F149\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"1BABC689-A27B-43C3-B402-2CFF1AFF0012\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19676250-FC97-4476-9A26-304DC8E4B872\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"0FF46332-4269-48FE-8D27-F0642FD08A75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFCBF8D-3FCA-4B17-9337-4BD621372F23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"A90A385E-F817-42D4-BB1B-AF37DE3C9491\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3586D962-114E-4CD4-B6D2-8B031BBB01B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"1C04F98D-5668-4398-8D8B-4CE9340F20A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25451714-5AE6-43C7-B1CC-A2ED2486E402\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8724DACC-85AC-4047-8960-27FCF58C5BF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"D70A4480-2C9E-4662-8612-23F66A649BA7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"0983154F-C4BC-413F-B020-085E83D5BB44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65373D8B-0DA8-4539-9E63-DBBDF493508E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"632A1555-3550-456B-8ED8-49E5929CE38E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"D3F580E9-2A0E-47E9-9C4B-2B971376C7EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.7\",\"matchCriteriaId\":\"0B400A32-0E46-4AAC-930F-D73A639C85DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2498876A-CDF4-423A-93C1-7337231D25E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"0C9BD0C4-5E5F-4E86-89F8-15821EC9618F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D793F78F-1A6C-47AC-9F17-877DA0C6DD7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"13FEC077-B0A0-4F87-A113-D0131946C358\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2052075-C2C4-4462-96B7-E3C448B81AD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"05A02352-B3C3-4A92-822B-9B458CB03EAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"257B6270-8551-4E08-8A04-E8D575407EE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"C5783487-C7E1-4E14-B37F-EB4E5A68669B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E73D31F1-2CAA-4837-BC3D-FD4160873334\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"5873909E-F741-4139-A29A-DF8D79CA330D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8015A1DA-A1B4-4EBC-98AC-941583EF8E37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"79C369C7-16EA-42CC-9E96-9D868977B632\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0A4172-5FC4-4925-8BDD-A903FC31AFA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"E379F3EF-6789-4897-9B33-EAB954114571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"11182C9F-B2A1-4AE2-9983-6AC3DB8DE372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"10586770-1426-435D-8137-2486A2843219\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787134FE-0549-427D-A9CE-32B1C58BC954\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"8919EE4B-349B-435A-8E9C-A4C24504AF02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"7DF64120-5611-41D1-ADC0-2C8F4522A205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"AFC418D6-76FF-4208-B649-9650E572B750\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228DC583-B6BC-4948-A167-53C49B6D04B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"68D1D724-D590-49FE-A301-C493FA4E50C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"01E3E66C-815B-4DAE-9A38-DD8C583A4DF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F653097B-9197-43A9-A9B4-8AA6EAFC5666\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"99D00C6D-2DCA-4737-9652-D576585ED712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"E8B0DC03-200A-4DE1-93C8-F46698E3C4B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A582D29-85D9-4FC3-B88A-42B947B9D18C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"47866545-C9BF-4FCA-ADCA-ED2E44FC4097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"076A3429-8E00-419F-96D0-40917CEDC328\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B9AF22-089B-41FB-8E30-BED3E4CE32ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"37B22541-27CF-488D-A35B-6E8EB3FD1958\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9BF014-B8EA-4DD9-8320-627C3D276596\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"F4290ACF-3E73-4C09-9001-6A2AC31BF719\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DD1E5ED-6A96-4C4A-87D4-692988479D01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"83DA643A-7804-4058-963B-D4F9EF48D368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B71980-6D7A-4B7B-9863-E85CC849ED90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"743D7983-774E-43A2-8D9E-FD7ECFF49208\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DC816E-1840-46F0-97C4-2BA00F5B9E64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"8FD7B44A-0421-471B-B777-2E1E4B6BC9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"05E71AD2-9353-48A0-8C5E-8CB0501E6CDF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4318B8A-B94C-4207-9731-76D35DE85034\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"A7C5B846-1076-498A-9B18-E3AB9CA71664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"D23AC0A0-B4D4-4405-BA85-D3CEDC99254C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D227B7-1121-4657-A621-AF0C0E766D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"D054B8D0-4B1E-4A04-A268-B9F5B2494E2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"5FBDE83D-0DC2-4265-8C13-6D67B8E551FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C37EA55-2526-4130-A57C-65950A5DFE57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"6678CEE9-D55E-4BEB-9684-9E6A1275D7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"2933150F-1ACD-4CBB-AF76-52B0EF30D314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625DE418-F506-4579-9C25-04DCD0FBC7ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"C24391FB-6E97-485C-A09E-BDEB991554A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC1C9BE-31B5-47DD-BE09-0984EE29A957\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"EE309C25-7405-43CA-84D9-D026995A2C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"5A4727DF-9C6B-451F-B0D8-97771723DB79\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F84DE3D-5FFD-4D6F-877A-A656287BDD7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"E09C70BB-0404-44D2-BCA5-1A1ACF96DC81\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E82803D-B1DE-4541-913C-9128B313AC0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"43F53028-CD42-4B00-8E47-6E04ECCD7DB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"1726990C-A56E-4FA3-A274-0059796DBD5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5295B4DF-DE6C-4725-A22B-1186D5AB1325\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"37EF7FFF-27D8-493F-AC08-CA08D8C68B9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"45D29250-F220-473C-B50D-CBEBCFF2FACC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"315CA850-DA5C-46E8-90A1-457320A52AA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"CE4D0323-BBDE-4770-956C-343C44C0963B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"6C7A64C0-9FEF-4B90-B938-80B23AE31172\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4504923B-C903-432D-B4D2-287BD0145F3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"27BC97E5-6000-4BB0-990A-63CC9EB7B464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D62A63-1E53-469C-B06C-DB6D05C7BE2F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"0ECC2E3B-9D0A-4599-B183-A8D13486A07E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699735FA-D33E-4F32-9584-B15938FB954E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"CA84174C-4735-41D7-AED6-4628A00506CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"451A5CEC-8FE1-49AB-B196-BA644E6C6052\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C40B478-C28F-430A-A690-5EF9FFB4812E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"70A64A15-79FD-4C33-B0A2-6B5AB22E0A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"D0F60FE9-4C8C-4987-BA4D-A013565C0276\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4F462E8-6427-4E42-902B-07E8A9366423\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"D930CFA9-2991-42D9-B34F-A33ECD1EB5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"9DCDD22F-A2FE-4A33-B577-E54434BCA715\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B87FA44-4931-4DC4-89BE-72A591C7C355\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"4000DB83-9F7E-4CF2-8BE4-620518BAE9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"B2F06ECA-134C-4C77-B347-17FCACB23AF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8ECCA-405E-4D60-92ED-7F29F36A985F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"409F0831-39FC-406B-9F40-1A819D94E638\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB77A5C7-026C-4172-970A-28E0D1A6F2D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"60C59833-B82E-411B-8538-EABFE4F14E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"45BFE7A0-2AFE-47E9-B383-E4A46DEF8418\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB96DDC-9961-47D4-81DF-4117A1B9C8F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"81CF6DA5-1686-46B9-910D-A94DD63F08DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7469CB-2CDE-4D2D-988A-13A482A59B28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"29C38D34-5902-469F-BA3D-2C4F8D8A3CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"153F7DFA-1B02-4DFB-8E1E-B651BD09F900\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F97B4A-B323-4354-9CAC-60BCB02A44DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"D42814F5-C33D-43DF-A1B9-A993F7D65881\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"36C33DCB-487D-4CB4-A4C0-2C4B510AF422\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96B57263-4900-4F2E-AA5C-554B5163F489\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"650DC374-F23A-4FE1-9AA4-CC55DD5B88A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"04F1AD94-F4F4-467A-A48F-AA4FD46D0191\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A89BEEB-3F13-4C41-9133-788232DD229B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"05478558-3571-47B6-865A-51C382710FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"78546B3A-97EB-4700-85EB-04CBED086A1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1ADB5D-D2CF-464B-9F1C-45F31A032953\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"6B44F218-4547-4011-B6DB-575CF501A872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"7F85CD06-04CC-4A4E-A279-D110D966FAAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B22E55C6-F71F-4EA7-B679-895A012B7020\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"1330489C-DFC4-4403-B656-E4CFFF0101E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"534F07F3-622A-4756-9C51-5403C12AA0D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C188F12-157F-4B8C-9A66-678B933E20F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"A22DC676-E8C6-4422-942E-55EB3535DB68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B846175B-4DC0-4268-AAF2-F266BFD7646E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"34386461-6500-4653-BF1B-5E5299D0E662\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD217200-9848-425F-B113-E624C027BC9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"150F7911-3FB3-429B-8974-7CD3D08A2109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"23A09F00-EBA9-4D82-8CC6-99C36095EFB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"ADE56943-366C-4D0E-8367-1E63C104F1D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"B635143B-5C87-4A26-8E99-80D1061586C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"9217655B-2A6A-457B-A72A-240DABD72ED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5ABFF7-F5DA-485F-976B-5C858B85E994\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"E9AA22E6-35C2-4D7D-8521-315F1CF617E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"1513AAB7-E518-4E71-A2C8-D677677F7284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC3E2A0-797D-4512-98A5-4ACE48EF4225\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"523910EF-FEFF-410B-8256-C7C0CE39649F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0C9A21-7CFE-452F-8505-834AB8579D9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"5E7F61CB-714A-4855-AB07-7281E05D7F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FF86645-253A-4BA3-BA2A-2725575C390D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"26E65A66-EEC8-42B7-9787-F55339B70EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"E971141F-469A-499D-8F2A-20F8999240DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894E4DDA-D9BE-441D-B447-B1CE52959347\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"C66404FA-6FCE-43B7-8F3C-177FB740C39E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E644893-0457-43A9-98AB-9DB37A5C415C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"334E4F8A-B695-46A1-8362-4B97FE5CD424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"4B649FFA-6D64-42A1-80A9-9B590EA8F5E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E33E647-5883-44FA-9915-34B89090D4E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"1F167623-480E-49F3-869C-4CFD897AF696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"0BB13341-7544-4459-B29F-D0F9BEE3001E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7194998-2D96-43DE-85B6-35A8E474C695\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6\",\"matchCriteriaId\":\"23AEEDBE-5556-4358-A955-C4F30D969642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.4\",\"matchCriteriaId\":\"FA97EBDF-8908-462A-807A-CDBA15AD5952\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A66A89-CF31-4C63-9562-707C03117104\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T15:47:06.496Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-33778\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-09T17:24:27.672008Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-798\", \"description\": \"CWE-798 Use of Hard-coded Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-09T17:24:14.735Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-06-01T00:00:00\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-33778\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-09T17:24:35.184Z\", \"dateReserved\": \"2023-05-22T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-06-01T00:00:00\", \"assignerShortName\": \"mitre\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.