Vulnerabilites related to zyxel - nr5103_firmware
cve-2024-0816
Vulnerability from cvelistv5
Published
2024-05-21 01:29
Modified
2024-08-01 18:18
Severity ?
EPSS score ?
Summary
The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zyxel | DX3300-T1 firmware |
Version: V5.50(ABVY.4)C0 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-0816", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-21T15:09:28.440350Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T17:58:43.786Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T18:18:18.882Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "DX3300-T1 firmware", vendor: "Zyxel", versions: [ { status: "affected", version: "V5.50(ABVY.4)C0", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.", }, ], value: "The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-21T01:29:00.883Z", orgId: "96e50032-ad0d-4058-a115-4d2c13821f9f", shortName: "Zyxel", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "96e50032-ad0d-4058-a115-4d2c13821f9f", assignerShortName: "Zyxel", cveId: "CVE-2024-0816", datePublished: "2024-05-21T01:29:00.883Z", dateReserved: "2024-01-23T01:35:49.705Z", dateUpdated: "2024-08-01T18:18:18.882Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-43389
Vulnerability from cvelistv5
Published
2023-01-11 00:00
Modified
2025-04-09 13:52
Severity ?
EPSS score ?
Summary
A buffer overflow vulnerability in the library of the web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zyxel | NR7101 firmware |
Version: < V1.15(ACCC.3)C0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T13:32:58.640Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-43389", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-04-09T13:52:13.858354Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-04-09T13:52:22.737Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "NR7101 firmware", vendor: "Zyxel", versions: [ { status: "affected", version: "< V1.15(ACCC.3)C0", }, ], }, ], descriptions: [ { lang: "en", value: "A buffer overflow vulnerability in the library of the web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-01-11T00:00:00.000Z", orgId: "96e50032-ad0d-4058-a115-4d2c13821f9f", shortName: "Zyxel", }, references: [ { url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders", }, ], }, }, cveMetadata: { assignerOrgId: "96e50032-ad0d-4058-a115-4d2c13821f9f", assignerShortName: "Zyxel", cveId: "CVE-2022-43389", datePublished: "2023-01-11T00:00:00.000Z", dateReserved: "2022-10-18T00:00:00.000Z", dateUpdated: "2025-04-09T13:52:22.737Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5412
Vulnerability from cvelistv5
Published
2024-09-03 01:18
Modified
2024-09-03 14:10
Severity ?
EPSS score ?
Summary
A buffer overflow vulnerability in the library "libclinkc" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zyxel | VMG8825-T50K firmware |
Version: 5.50(ABOM.8)C0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:zyxel:vmg8825-t50k_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "vmg8825-t50k_firmware", vendor: "zyxel", versions: [ { status: "affected", version: "5.50\\(abom.8\\)c0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5412", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-03T13:56:18.695788Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-03T14:10:55.771Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "VMG8825-T50K firmware", vendor: "Zyxel", versions: [ { status: "affected", version: "5.50(ABOM.8)C0", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A buffer overflow vulnerability in the library \"libclinkc\" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.", }, ], value: "A buffer overflow vulnerability in the library \"libclinkc\" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-03T01:18:40.444Z", orgId: "96e50032-ad0d-4058-a115-4d2c13821f9f", shortName: "Zyxel", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerability-in-some-5g-nr-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-security-router-devices-09-03-2024", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "96e50032-ad0d-4058-a115-4d2c13821f9f", assignerShortName: "Zyxel", cveId: "CVE-2024-5412", datePublished: "2024-09-03T01:18:40.444Z", dateReserved: "2024-05-27T09:15:19.761Z", dateUpdated: "2024-09-03T14:10:55.771Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2024-05-21 02:15
Modified
2025-01-22 22:58
Severity ?
Summary
The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte3202-m437_firmware:1.00\\(abwf.3\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "81A33B0C-1C6D-4F91-8A00-1EC2983BA546", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte3202-m437:-:*:*:*:*:*:*:*", matchCriteriaId: "9AFA5A91-B372-464B-9C8E-DFC6552E64EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte3301-plus_firmware:1.00\\(abqu.5\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "19D6A70E-C613-422C-9877-C7FE746B7DED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "4814D3A1-C0D4-4573-AD77-C2EE7AC11CB4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte5388-m804_firmware:1.00\\(absq.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "C5C71961-954D-4D3D-92AB-E13ECE2DD57D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte5388-m804:-:*:*:*:*:*:*:*", matchCriteriaId: "E67FFCF7-ECE9-4644-B248-1B6E10AD9398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte5398-m904_firmware:1.00\\(abq.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "147D492A-0C2D-4144-B25A-1D8A51C2D803", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte5398-m904:-:*:*:*:*:*:*:*", matchCriteriaId: "F90453B8-19FF-4FF3-A167-E1A70E022201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte7240-m403_firmware:2.00\\(abmg.7\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "6F7083E8-BE21-4D77-B078-5CF863C45D1A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte7240-m403:-:*:*:*:*:*:*:*", matchCriteriaId: "AAE2212F-D523-4706-9FD2-FDA760EE4B4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte7480-m804_firmware:1.00\\(abra.8\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "E0C5D3D7-6764-4209-9B72-EC3246BD9E04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*", matchCriteriaId: "E3480021-1538-48ED-BE89-BB0DF562C7DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte7490-m904_firmware:1.00\\(abqy.7\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "09978714-3EE5-4F2C-BE71-F10115AB4C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*", matchCriteriaId: "DC75F6DE-DCAF-47A0-B6BB-0E050C68AF25", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103_firmware:4.19\\(abyc.5\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "ACCDDB8C-AB71-4F07-825B-2203128DD2FC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103:-:*:*:*:*:*:*:*", matchCriteriaId: "C821C282-A1E3-4E31-A0C3-96936A4D90CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103e_firmware:1.00\\(acdj.1\\)b3:*:*:*:*:*:*:*", matchCriteriaId: "81D2689F-5E2C-489B-B7D9-7AB41875B55F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103e:-:*:*:*:*:*:*:*", matchCriteriaId: "97C7B929-E318-4E17-8AF9-160C8613132D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103ev2_firmware:1.00\\(aciq.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "2EA7238F-921D-464F-BDF9-9AEDDDA80442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103ev2:-:*:*:*:*:*:*:*", matchCriteriaId: "D51186E3-34CE-4417-94B2-5B7AD1DAE43E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5307_firmware:1.00\\(acjt.0\\)b4:*:*:*:*:*:*:*", matchCriteriaId: "6C574A4A-4B15-4EF8-890B-8581EA4CD041", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5307:-:*:*:*:*:*:*:*", matchCriteriaId: "27C408EF-36D8-4111-8CC5-C1278A884F67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7101_firmware:1.00\\(abu.9\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "70357ACC-ACB1-4BA4-A545-4354419170A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D27B24-9822-432C-8B8B-9546EE32DEC6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7102_firmware:1.00\\(abyd.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "056EEAB9-C6C8-4B91-A3CF-561AED14991B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*", matchCriteriaId: "F1A15757-DE6F-4A72-9CAD-BAC04BD340A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7103_firmware:1.00\\(accz.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "C5674FA8-D57E-4F69-B01D-F720BD934915", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7103:-:*:*:*:*:*:*:*", matchCriteriaId: "77584A2D-D878-46E5-A632-10912DC3B794", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7302_firmware:1.00\\(acha.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "211237F0-6215-49DA-937B-B46E54038C96", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7302:-:*:*:*:*:*:*:*", matchCriteriaId: "D1793FC4-BA0C-4CFC-93BB-3BCD899E7F23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7303_firmware:1.00\\(acei.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "01229D08-346A-42D5-A38F-6A04D2389F5F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7303:-:*:*:*:*:*:*:*", matchCriteriaId: "9CE64F27-D4A3-40B4-A117-3F5B2B140801", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7501_firmware:1.00\\(aceh.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "3F350386-29DD-4A55-83C2-65B43BAB8A4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7501:-:*:*:*:*:*:*:*", matchCriteriaId: "AA121671-E805-4FEF-B934-062FD7DC89F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa505_firmware:1.18\\(acko.1\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "20B36C8D-279B-4A77-942E-9018D5C9C589", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa505:-:*:*:*:*:*:*:*", matchCriteriaId: "5052039B-5273-4CDF-AFA5-609855801D24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa510_firmware:1.18\\(acgd.1\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "6D509845-08B7-46FD-B4FD-D51863D7C941", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa510:-:*:*:*:*:*:*:*", matchCriteriaId: "80B7099C-DAA5-4902-A62B-B680C9450575", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa710_firmware:1.17\\(acgc.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "EE14BEBF-EDCD-4360-99DA-95CCC0C7FDCD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa710:-:*:*:*:*:*:*:*", matchCriteriaId: "92221518-C7EA-46D7-8037-A580CEA01093", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:1.17\\(acca.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "EC1FBA6C-5E8F-4132-9AF0-F89D01D33BA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "42297A6A-3E50-4E9E-ABF6-58C77F222DC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_lte7461-m602_firmware:1.15\\(ace.3\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "A65D2E79-85C5-4016-BF1D-068B7E9CC272", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_lte7461-m602:-:*:*:*:*:*:*:*", matchCriteriaId: "44AA94AF-24B0-4C91-A990-9418EA5A5DAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_nr5101_firmware:1.16\\(accg.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "042F6ACF-B952-4D18-A35D-0AE3743B32CB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_nr5101:-:*:*:*:*:*:*:*", matchCriteriaId: "F9F605B8-A892-4119-AB7A-D14CDC5DFC88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_nr7101_firmware:1.16\\(accc.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "494D8AA4-C3D4-42E3-BEB6-39995E6D4470", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*", matchCriteriaId: "52096C1F-F73C-413E-9D37-82EFA4703AEC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx3300-t1_firmware:5.50\\(aby.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "39CA06C1-90B9-4426-8FCD-53908911689E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx3300-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "2456F691-C182-4BE6-A08F-5E1717366DCA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx3301-t0_firmware:5.50\\(aby.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "E7BF144B-4B22-46C2-874E-A2ECD64AB043", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "3BBDC072-5D40-4130-9B5F-22FDA9BF909A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx4510_firmware:5.17\\(abyl.6\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "F7CBCA82-4DAF-46A9-9043-B1A92CE2DC79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx4510:-:*:*:*:*:*:*:*", matchCriteriaId: "48A35F59-2BE4-4BE2-95B2-AE33255BBDA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx5401-b0_firmware:5.17\\(abyo.5\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "F0CAE6A8-B04F-42FB-A0D2-D6F5D4622FAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "B293E564-2C48-442A-A415-34383DF3ADBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx5401-b1_firmware:5.17\\(abyo.5\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "8ED7E7AA-1D08-4CB7-8617-6896C56D68F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx5401-b1:-:*:*:*:*:*:*:*", matchCriteriaId: "AFE5C53C-4255-4AEE-A49E-36C1A2CF10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:emg3525-t50b_firmware:5.50\\(abpm.8\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "A66CE0FE-27D7-418D-841A-96C5F157A2A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "9259E2F6-885D-4B44-8D40-20758DA599D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:emg5523-t50b_firmware:5.50\\(abpm.8\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "1D9E74CF-3FFA-4613-9831-152955307178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "F3ECE0EB-C429-4716-ABFB-73540847EB9E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:emg5723-t50k_firmware:5.50\\(abom.8.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "A66FEC22-82D4-4801-8969-D5D5308622A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*", matchCriteriaId: "B18982B2-E575-478E-A2B4-0932DE329056", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3300-t1_firmware:5.50\\(aby.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "8A90F2DC-861C-47BF-A67F-D6AAB3595AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3300-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "F766221F-7478-4E39-B4CD-A2498ACEE754", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3301-t0_firmware:5.50\\(aby.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "B1DBDF16-C65F-4F78-BB2F-E2EDE827A658", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "B37B17D8-76CF-4A26-B2DB-41B1BC9FD0A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3320-t0_firmware:5.71\\(yak.2\\)d0:*:*:*:*:*:*:*", matchCriteriaId: "185291FB-9202-4919-B0D7-403FF35ACA94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3320-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "D2152C57-561C-41FB-BF0F-11EEE36ED9DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3320-t1_firmware:5.71\\(yap.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "051DD8B7-52A0-4629-BD8F-B4952E22C857", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3320-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "07BC3506-9000-4897-B8E2-45CA354F0953", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3500-t0_firmware:5.44\\(achr.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "D1B3F5D6-77F3-41DB-A2F1-D3D66464A598", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3500-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "8714EB1B-38E5-4295-AD26-EE13E2161DEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3501-t0_firmware:5.44\\(achr.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "ECD2D2A5-0884-4B2A-A969-F48230F6F35D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3501-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "A98F76BD-0404-46DD-AE6A-EB630FEC8904", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3510_firmware:5.17\\(abup.11\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "EB0F17F9-DA8D-4BA0-81BA-2969DEAB5E82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3510:-:*:*:*:*:*:*:*", matchCriteriaId: "E0F2881E-A3FB-40FE-8259-0B69AFA025E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5401-b0_firmware:5.17\\(abyo.5\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "394DBD92-A0F2-483C-9455-5699CBC30C1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1B9D0C-AB6C-43E1-BFCA-50EF231510FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5401-b1_firmware:5.17\\(abyo.5\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "29922C44-EE6B-4204-93AE-A651D7E3F3DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5401-b1:-:*:*:*:*:*:*:*", matchCriteriaId: "7213FA12-5CD6-4E9B-8387-A52AEF17EA10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5501-b0_firmware:5.17\\(abry.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "8983D127-53E7-45F7-A125-B400AE354D79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "88B8CDD0-E73A-4FAA-9964-D8C09949CB32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5510_firmware:5.17\\(abqx.9\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "4253BD52-714D-4F97-8622-CC92E52B5C9E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5510:-:*:*:*:*:*:*:*", matchCriteriaId: "469C7BC8-47DB-4B39-9DD5-BB6C5620C488", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5512-t0_firmware:5.70\\(aceg.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "3C26B8D2-7745-4D48-B8DA-3A8DD94DCECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "F32FA3FB-CE89-4CC1-9D8D-765B90A122DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5600-t1_firmware:5.70\\(acdz.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "B0FB1871-0E0C-4262-A0F3-7C9F86803187", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5600-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "021CFB91-4627-4080-BF09-0BB5EFA708DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5601-t0_firmware:5.70\\(acdz.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "C601F782-6040-4CE3-AE17-46740DADFA68", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "ABFF2039-5DCC-4850-8BDA-3D418629C226", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5601-t1_firmware:5.70\\(acdz.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "2611F0F9-CE8D-4DA9-B88F-213DF947983D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "D629D4B6-B2F2-45F1-9295-71751570C231", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex7710-b0_firmware:5.18\\(acak.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "FAE3F3CA-CCE5-4894-BEC0-5D06D2F3D806", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex7710-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "07727D9C-723B-4761-B6B6-07FE1784D3C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg3625-t50b_firmware:5.50\\(abpm.8\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "5B8ACC3B-6A8E-4380-A621-551D64ADDB35", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "BB5E8468-D12F-4CBE-AC7E-27D5A928A85A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg3927-t50k_firmware:5.50\\(abom.8.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "A7E4B285-39A7-4B20-8F7C-C1FCCEC45879", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*", matchCriteriaId: "1B33AE56-3948-494B-9E23-54D939DF0D3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg4005-b50a_firmware:5.17\\(abqa.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "1AB9DF68-C592-4C25-A032-0DFC4AA5C4B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*", matchCriteriaId: "88F74228-AC0C-4150-974D-54D77BBF9A90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg4005-b60a_firmware:5.17\\(abqa.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "F24368C0-03E7-461B-901F-176F4470EED4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*", matchCriteriaId: "30C1B91D-3EA0-4A1D-833A-6767A6C84DA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg8623-t50b_firmware:5.50\\(abpm.8\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "63727E2F-DBDC-490B-81C7-3E6C4B640694", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "C3535B63-318C-4EB5-ADC8-0AF3FB443DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg8825-t50k_firmware:5.50\\(abom.8.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "904EDFD7-FB8E-4E4F-AFD6-C8153C99B9CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C2320B-52DF-4F86-86D2-42FB62337773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ax7501-b0_firmware:5.17\\(abpc.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "ADBFF951-7503-45B3-838D-5CEFC1E22303", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "78473083-F702-4B81-AAA0-B66A0984FF6B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ax7501-b1_firmware:5.17\\(abpc.4\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "502DDF99-A3B5-4C7D-B4FD-79420528A515", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ax7501-b1:-:*:*:*:*:*:*:*", matchCriteriaId: "780BBA7D-7E2C-4624-AA15-8A51F3DF428F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm3100-t0_firmware:5.42\\(acbf.1.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "6A39C035-24A3-4F5F-84E1-45D911F14C5D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm3100-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "F78F88D4-A782-4075-A3CB-A728CE4014DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm5100-t0_firmware:5.42\\(acbf.1.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "AB68CB8D-3AB9-4CAD-8784-F6E9ABB8BC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm5100-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "249AF476-CAA4-4C87-8CC3-E0AF15E61F7E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm7300-t0_firmware:5.42\\(abyy.1\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "6D8ED113-F34D-4F90-A1E5-E5DF67F71710", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "8AD1E2E3-2BB8-4CB3-AF81-C916312FE361", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:px3321-t1_firmware:5.44\\(acjb.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "499CF93A-8044-4FD7-A0C7-0C6068D0CAA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:px3321-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "3BB525DE-2E08-4848-976E-7DF6C7E19578", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx3100-t0_firmware:5.50\\(abl.3\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "6FE1D8E3-79DB-4645-9B08-E6F5B1A6CFE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "C2C56248-D12F-46DC-A52F-0607E4A5DCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx3401-b0_firmware:5.17\\(abe.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "B20B5986-4F8F-4609-B7E4-AA89231102BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx3401-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "677C554B-F9C7-4780-97C0-6021146F8B3C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx5600-t0_firmware:5.70\\(acdz.2\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "8C57BE0E-061D-40F5-89BF-52784B521E9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "303DB62A-2A7E-4CB7-ADA0-29C23BFD41BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx5610-b0_firmware:5.18\\(acgj.0\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "B4F867EE-2A8C-4CDF-9D02-6E739BEA6A81", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx5610-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "88909887-E078-4EC5-BA49-2EFCABF1EB1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nbg7510_firmware:1.00\\(abzy.6\\)c0:*:*:*:*:*:*:*", matchCriteriaId: "6B2305BE-0D40-4582-B775-4CDF62D3166C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nbg7510:-:*:*:*:*:*:*:*", matchCriteriaId: "98CB675F-DF0C-46C3-B206-CCFF407D2BA6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.", }, { lang: "es", value: " La vulnerabilidad de desbordamiento del búfer en la versión de firmware V5.50(ABVY.4)C0 del DX3300-T1 podría permitir que un atacante local autenticado provoque condiciones de denegación de servicio (DoS) ejecutando el comando CLI con cadenas manipuladas en un dispositivo afectado.", }, ], id: "CVE-2024-0816", lastModified: "2025-01-22T22:58:56.180", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "security@zyxel.com.tw", type: "Primary", }, ], }, published: "2024-05-21T02:15:08.743", references: [ { source: "security@zyxel.com.tw", tags: [ "Vendor Advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024", }, ], sourceIdentifier: "security@zyxel.com.tw", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "security@zyxel.com.tw", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-01-11 02:15
Modified
2024-11-21 07:26
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A buffer overflow vulnerability in the library of the web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte3202-m437_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CEED7B93-7998-429A-9B16-49BAE465704F", versionEndExcluding: "1.00\\(abwf.1\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte3202-m437:-:*:*:*:*:*:*:*", matchCriteriaId: "9AFA5A91-B372-464B-9C8E-DFC6552E64EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte3316-m604_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FBDC947-18E3-4A46-A7B3-9AB18032254E", versionEndExcluding: "2.00\\(abmp.6\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte3316-m604:-:*:*:*:*:*:*:*", matchCriteriaId: "557BE1D0-A562-4176-8E59-562E329DD602", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte7480-m804_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DFDC741-78E6-42AA-B647-DEE9F04AA2DD", versionEndExcluding: "1.00\\(abra.6\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*", matchCriteriaId: "E3480021-1538-48ED-BE89-BB0DF562C7DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:lte7490-m904_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB812F29-2FAE-414C-9047-2471148B1E36", versionEndExcluding: "1.00\\(abqy.5\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*", matchCriteriaId: "DC75F6DE-DCAF-47A0-B6BB-0E050C68AF25", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa510_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7D1CEC6-D45B-4B6A-8A58-B099ADF57413", versionEndExcluding: "1.15\\(acgd.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa510:-:*:*:*:*:*:*:*", matchCriteriaId: "80B7099C-DAA5-4902-A62B-B680C9450575", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa710_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB7233D1-3202-471C-AEEA-F76E79F78346", versionEndExcluding: "1.15\\(acgc.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa710:-:*:*:*:*:*:*:*", matchCriteriaId: "92221518-C7EA-46D7-8037-A580CEA01093", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_nr7101_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA537481-4311-4C5E-B577-76C8A789FDAC", versionEndExcluding: "1.15\\(accc.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*", matchCriteriaId: "52096C1F-F73C-413E-9D37-82EFA4703AEC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B98AC59-4E5F-40AC-B6D6-DD669FAFEDCD", versionEndExcluding: "4.19\\(abyc.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103:-:*:*:*:*:*:*:*", matchCriteriaId: "C821C282-A1E3-4E31-A0C3-96936A4D90CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60ABD202-BEB3-4E0D-98CB-30AAA54E5B3B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103e:-:*:*:*:*:*:*:*", matchCriteriaId: "97C7B929-E318-4E17-8AF9-160C8613132D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63A72A80-DA68-4353-8FEA-D372180F8401", versionEndExcluding: "1.00\\(abuv.7\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D27B24-9822-432C-8B8B-9546EE32DEC6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7102_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C56958A5-2427-4A9A-BD40-3B548437CA36", versionEndExcluding: "1.00\\(abyd.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*", matchCriteriaId: "F1A15757-DE6F-4A72-9CAD-BAC04BD340A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7103_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FD95007-25FD-4EF9-A461-19FBB4468B3D", versionEndExcluding: "1.00\\(accz.1\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7103:-:*:*:*:*:*:*:*", matchCriteriaId: "77584A2D-D878-46E5-A632-10912DC3B794", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ep240p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CB5CB3D-4EBA-4C71-886A-5FF336E9F842", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ep240p:-:*:*:*:*:*:*:*", matchCriteriaId: "91367DDE-F430-42F7-B4F2-28AEF7FDCB12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm7320-b0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3B9C504-41A4-4756-BDB0-2EE317F801AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm7320-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "E6A479CC-D543-49A1-8A37-7E9D4A0F0009", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pmg5317-t20b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1141E1B7-B6B8-496B-A2CA-A9076D805741", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pmg5317-t20b:-:*:*:*:*:*:*:*", matchCriteriaId: "9F1334B5-FC76-412F-A7EF-02EEEE677460", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pmg5617ga_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "366FB20C-6740-431A-A0CA-6EC3FDD3C505", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pmg5617ga:-:*:*:*:*:*:*:*", matchCriteriaId: "9C1B0834-3398-41B0-9A14-7D97768732B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pmg5622ga_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F61E8935-26CD-4664-A95C-1BCA77DBC4DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pmg5622ga:-:*:*:*:*:*:*:*", matchCriteriaId: "840AF834-B7A6-4ACA-BAB9-996D87476D3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A buffer overflow vulnerability in the library of the web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.", }, { lang: "es", value: "Una vulnerabilidad de desbordamiento de búfer en la librería del servidor web en el firmware Zyxel NR7101 anterior a V1.15(ACCC.3)C0, que podría permitir que un atacante no autenticado ejecute algunos comandos del sistema operativo o cause condiciones de denegación de servicio (DoS) en un dispositivo vulnerable.", }, ], id: "CVE-2022-43389", lastModified: "2024-11-21T07:26:22.850", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4.7, source: "security@zyxel.com.tw", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-01-11T02:15:11.073", references: [ { source: "security@zyxel.com.tw", tags: [ "Vendor Advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders", }, ], sourceIdentifier: "security@zyxel.com.tw", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "security@zyxel.com.tw", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-03 02:15
Modified
2024-09-06 18:07
Severity ?
Summary
A buffer overflow vulnerability in the library "libclinkc" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "66671CE5-B6EC-45EA-AC48-FF39A8124675", versionEndExcluding: "1.18\\(acca.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "42297A6A-3E50-4E9E-ABF6-58C77F222DC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa505_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E75A4058-1311-4043-B9C5-6AD7300DE1E3", versionEndExcluding: "1.18\\(acko.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa505:-:*:*:*:*:*:*:*", matchCriteriaId: "5052039B-5273-4CDF-AFA5-609855801D24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa710_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD47408-EDB1-4B79-A677-AEDECA548CD0", versionEndExcluding: "1.18\\(acgc.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa710:-:*:*:*:*:*:*:*", matchCriteriaId: "92221518-C7EA-46D7-8037-A580CEA01093", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nebula_fwa510_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "594F2E16-4D3E-4617-A91B-C9911880294C", versionEndExcluding: "1.18\\(acgd.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nebula_fwa510:-:*:*:*:*:*:*:*", matchCriteriaId: "80B7099C-DAA5-4902-A62B-B680C9450575", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx5600-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43D29BE5-A0A9-4EA3-A0BB-AF3FCB83B9E5", versionEndExcluding: "5.70\\(aceb.3.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "303DB62A-2A7E-4CB7-ADA0-29C23BFD41BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx3401-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FEEFBA62-FF41-47F3-81F5-61034302A0E9", versionEndExcluding: "5.17\\(abve.2.5\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx3401-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "677C554B-F9C7-4780-97C0-6021146F8B3C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:wx3100-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E96FD496-D6B2-4221-8CDE-87ECCC6AE2EF", versionEndExcluding: "5.50\\(abvl.4.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "C2C56248-D12F-46DC-A52F-0607E4A5DCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:scr50axe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "093F98C0-F84F-408C-9835-D63F238E81E9", versionEndExcluding: "1.10\\(acgn.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:scr50axe:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE16790-D3CB-48D2-9C4C-ACCED14035BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:px3321-t1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35734339-B6A7-433C-85F6-D125990DAB2F", versionEndExcluding: "5.44\\(acjb.0.2\\)z0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:px3321-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "3BB525DE-2E08-4848-976E-7DF6C7E19578", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm7300-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7BD127D7-3B27-4D3B-A82C-B08D8BCFACF0", versionEndExcluding: "5.42\\(abyy.2.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "8AD1E2E3-2BB8-4CB3-AF81-C916312FE361", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm5100-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AD5D584-14FB-424D-9175-A8F122483748", versionEndExcluding: "5.42\\(acbf.2.1\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm5100-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "249AF476-CAA4-4C87-8CC3-E0AF15E61F7E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:pm3100-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF26B807-83DE-4D66-AB11-C8FF20D579D8", versionEndExcluding: "5.42\\(acbf.2.1\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:pm3100-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "F78F88D4-A782-4075-A3CB-A728CE4014DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ax7501-b1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61AC6D95-80A9-447F-9CB4-6CCA3A86334B", versionEndExcluding: "5.17\\(abpc.5.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ax7501-b1:-:*:*:*:*:*:*:*", matchCriteriaId: "780BBA7D-7E2C-4624-AA15-8A51F3DF428F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ax7501-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A6A3F96-61FF-4956-9FE6-B2B939E34A3D", versionEndExcluding: "5.17\\(abpc.5.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "78473083-F702-4B81-AAA0-B66A0984FF6B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg8825-t50k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2781DE8-ADD6-48EF-8FC5-D2DBAEC44E8D", versionEndExcluding: "5.50\\(abom.8.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C2320B-52DF-4F86-86D2-42FB62337773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg8623-t50b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "191B287A-F923-42EE-81F5-A8895F15ABF6", versionEndExcluding: "5.50\\(abpm.9.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "C3535B63-318C-4EB5-ADC8-0AF3FB443DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg4005-b60a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D071180D-5C20-4938-98D5-11FDC86BC93D", versionEndExcluding: "5.15\\(abqa.2.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*", matchCriteriaId: "30C1B91D-3EA0-4A1D-833A-6767A6C84DA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg4005-b50a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B111007F-77CF-43A6-AFE9-B7B845D822E1", versionEndExcluding: "5.15\\(abqa.2.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*", matchCriteriaId: "88F74228-AC0C-4150-974D-54D77BBF9A90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg3927-t50k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4555EDDD-B50A-41F1-B603-D384DE0CC42A", versionEndExcluding: "5.50\\(abom.8.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*", matchCriteriaId: "1B33AE56-3948-494B-9E23-54D939DF0D3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:vmg3625-t50b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5EB06CB-BCFB-4EBF-A1C6-0A72DD9C56D8", versionEndExcluding: "5.50\\(abpm.9.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "BB5E8468-D12F-4CBE-AC7E-27D5A928A85A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:emg5723-t50k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3530C6BA-5001-4BE2-B5EF-1A2638B234FF", versionEndExcluding: "5.50\\(abom.8.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*", matchCriteriaId: "B18982B2-E575-478E-A2B4-0932DE329056", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:emg5523-t50b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "357C7DEF-891E-4D2D-9975-785E190B0E28", versionEndExcluding: "5.50\\(abpm.9.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "F3ECE0EB-C429-4716-ABFB-73540847EB9E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:emg3525-t50b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8657DD28-3CBB-4828-927A-07DFF03E07DC", versionEndExcluding: "5.50\\(abpm.9.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*", matchCriteriaId: "9259E2F6-885D-4B44-8D40-20758DA599D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex7710-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50F8A5D1-04C5-4187-AD53-A7BAEBB2D5F3", versionEndExcluding: "5.18\\(acak.1\\)c1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex7710-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "07727D9C-723B-4761-B6B6-07FE1784D3C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex7501-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE07CE74-7E9A-4319-A04B-FAB27DF20A5E", versionEndExcluding: "5.18\\(achn.1.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex7501-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "1CE049DE-A5DA-4A4F-BA30-BBD09FF34DE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5601-t1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8BBBF350-66DE-4337-8E95-F1C5D75D5151", versionEndExcluding: "5.70\\(acdz.3.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "D629D4B6-B2F2-45F1-9295-71751570C231", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5601-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5222AE4A-192D-4B52-B12A-7DC04047CDD4", versionEndExcluding: "5.70\\(acdz.3.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "ABFF2039-5DCC-4850-8BDA-3D418629C226", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5512-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4CB5021-3A4C-4D2E-BC78-4E027DB217E9", versionEndExcluding: "5.70\\(aceg.3\\)c2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "F32FA3FB-CE89-4CC1-9D8D-765B90A122DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5510-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05F3DCE4-A704-44CA-9100-94D0736990E8", versionEndExcluding: "5.17\\(abqx.10\\)b2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5510-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "E82D41CC-2EB3-4892-8383-FB2C9EC64D9E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5401-b1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A8CA39B3-1819-4EAF-86AD-AFBA7C22C9AE", versionEndExcluding: "5.17\\(abyo.6.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5401-b1:-:*:*:*:*:*:*:*", matchCriteriaId: "7213FA12-5CD6-4E9B-8387-A52AEF17EA10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex5401-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6938EC2C-CAC9-4A43-8B30-96BD92279087", versionEndExcluding: "5.17\\(abyo.6.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1B9D0C-AB6C-43E1-BFCA-50EF231510FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3510-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC7EDFCA-8E0A-4E60-80C9-1C817845E067", versionEndExcluding: "5.17\\(abup.12\\)b2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3510-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "E0455EC5-B783-4CDB-9DC0-D8EF377A5F2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3501-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D72F97BC-0C04-436E-82EC-956164D97608", versionEndExcluding: "5.44\\(achr.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3501-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "A98F76BD-0404-46DD-AE6A-EB630FEC8904", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3500-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD151CF9-DC45-475A-9128-91102B7CDF34", versionEndExcluding: "5.44\\(achr.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3500-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "8714EB1B-38E5-4295-AD26-EE13E2161DEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3301-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CC5D271-3679-4962-8096-58BC125E553A", versionEndExcluding: "5.50\\(abvy.5.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "B37B17D8-76CF-4A26-B2DB-41B1BC9FD0A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3300-t1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09AF8A00-ECF7-43EA-98FB-6BDA7C5CAD60", versionEndExcluding: "5.50\\(abvy.5.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3300-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "F766221F-7478-4E39-B4CD-A2498ACEE754", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:ex3300-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E60A1553-6685-4C75-91D0-199AC09558C6", versionEndExcluding: "5.50\\(abvy.5.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:ex3300-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "137F8B94-4176-4D9B-8704-28525E7352D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx5401-b1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96DF49B6-9BF6-45FC-BCA5-B612F01AC2E1", versionEndExcluding: "5.17\\(abyo.6.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx5401-b1:-:*:*:*:*:*:*:*", matchCriteriaId: "AFE5C53C-4255-4AEE-A49E-36C1A2CF10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx5401-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8AF84D6-113E-49F3-9F3C-7EFE5DFEA8BF", versionEndExcluding: "5.17\\(abyo.6.2\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "B293E564-2C48-442A-A415-34383DF3ADBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx4510-b0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99FEDEFF-3295-412F-903C-69709C6DC39C", versionEndExcluding: "5.17\\(abyl.7\\)b2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx4510-b0:-:*:*:*:*:*:*:*", matchCriteriaId: "A0338E1C-2509-4510-8C8D-4BD5AEA47D81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx3301-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "582711B2-B998-4FF8-8237-99B3B62EDC87", versionEndExcluding: "5.50\\(abvy.5.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "3BBDC072-5D40-4130-9B5F-22FDA9BF909A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx3300-t1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F811CD1C-E4D8-43A0-8E95-07CE2566FC72", versionEndExcluding: "5.50\\(abvy.5.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx3300-t1:-:*:*:*:*:*:*:*", matchCriteriaId: "2456F691-C182-4BE6-A08F-5E1717366DCA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:dx3300-t0_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B3EF633-501B-43DB-8297-D9AF9335B6C1", versionEndExcluding: "5.50\\(abvy.5.3\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:dx3300-t0:-:*:*:*:*:*:*:*", matchCriteriaId: "6D3E176E-F728-4385-8533-4C694D43898A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7501_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A512E0EE-3424-4EB1-A9F7-D60A9156E83A", versionEndExcluding: "1.00\\(aceh.1\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7501:-:*:*:*:*:*:*:*", matchCriteriaId: "AA121671-E805-4FEF-B934-062FD7DC89F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34E4BB32-DF7F-4875-ABBB-C605E1F69872", versionEndExcluding: "1.00\\(acei.1\\)b4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7303:-:*:*:*:*:*:*:*", matchCriteriaId: "9CE64F27-D4A3-40B4-A117-3F5B2B140801", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7302_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A37EF06-D82D-4EDC-AC1D-E5B2F6CD751E", versionEndExcluding: "1.00\\(acha.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7302:-:*:*:*:*:*:*:*", matchCriteriaId: "D1793FC4-BA0C-4CFC-93BB-3BCD899E7F23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr7103_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCD1D0CD-8FA6-4AE8-8B6D-B22447D6035F", versionEndExcluding: "1.00\\(accz.4\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr7103:-:*:*:*:*:*:*:*", matchCriteriaId: "77584A2D-D878-46E5-A632-10912DC3B794", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5307_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9CC7837-215D-417A-8749-4A07F3E03FDB", versionEndExcluding: "1.00\\(acjt.0\\)b6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5307:-:*:*:*:*:*:*:*", matchCriteriaId: "27C408EF-36D8-4111-8CC5-C1278A884F67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103ev2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "729613A0-64D9-4D2C-B6C2-2696C0941E9A", versionEndExcluding: "1.00\\(aciq.1\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103ev2:-:*:*:*:*:*:*:*", matchCriteriaId: "D51186E3-34CE-4417-94B2-5B7AD1DAE43E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:nr5103_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4129E8DD-1C15-4621-84A1-6F53434968A6", versionEndExcluding: "4.19\\(abyc.6\\)c0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:nr5103:-:*:*:*:*:*:*:*", matchCriteriaId: "C821C282-A1E3-4E31-A0C3-96936A4D90CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A buffer overflow vulnerability in the library \"libclinkc\" of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.", }, { lang: "es", value: "Una vulnerabilidad de desbordamiento de búfer en la librería \"libclinkc\" de la versión de firmware 5.50(ABOM.8)C0 del Zyxel VMG8825-T50K podría permitir que un atacante no autenticado provoque condiciones de denegación de servicio (DoS) al enviar una solicitud HTTP manipulada a un dispositivo vulnerable.", }, ], id: "CVE-2024-5412", lastModified: "2024-09-06T18:07:43.940", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "security@zyxel.com.tw", type: "Primary", }, ], }, published: "2024-09-03T02:15:05.103", references: [ { source: "security@zyxel.com.tw", tags: [ "Vendor Advisory", ], url: "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerability-in-some-5g-nr-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-security-router-devices-09-03-2024", }, ], sourceIdentifier: "security@zyxel.com.tw", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "security@zyxel.com.tw", type: "Primary", }, ], }