Vulnerabilites related to draytek - vigor2620ln
cve-2022-32548
Vulnerability from cvelistv5
Published
2022-08-29 05:38
Modified
2024-08-03 07:46
Severity ?
EPSS score ?
Summary
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:46:43.481Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-29T05:38:35", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers", }, { tags: [ "x_refsource_MISC", ], url: "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2022-32548", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers", refsource: "MISC", url: "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers", }, { name: "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html", refsource: "MISC", url: "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2022-32548", datePublished: "2022-08-29T05:38:35", dateReserved: "2022-06-08T00:00:00", dateUpdated: "2024-08-03T07:46:43.481Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-33778
Vulnerability from cvelistv5
Published
2023-06-01 00:00
Modified
2025-01-09 17:24
Severity ?
EPSS score ?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T15:47:06.496Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-33778", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-09T17:24:27.672008Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "CWE-798 Use of Hard-coded Credentials", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-09T17:24:35.184Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-06-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-33778", datePublished: "2023-06-01T00:00:00", dateReserved: "2023-05-22T00:00:00", dateUpdated: "2025-01-09T17:24:35.184Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2022-08-29 06:15
Modified
2024-11-21 07:06
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html | Exploit, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B937B768-C53B-490F-B6A8-6B0A2CC6C05A", versionEndExcluding: "4.3.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", matchCriteriaId: "894E4DDA-D9BE-441D-B447-B1CE52959347", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05E81F44-7E9B-406E-BB4F-A3B6E5B82316", versionEndExcluding: "4.3.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", matchCriteriaId: "9FF86645-253A-4BA3-BA2A-2725575C390D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13C4AF21-4B66-4A84-95FB-268F8B644B39", versionEndExcluding: "4.3.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", matchCriteriaId: "BD0C9A21-7CFE-452F-8505-834AB8579D9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2962p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17AD71DA-3550-4C1F-B2D6-BE8521E8A86C", versionEndExcluding: "4.3.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2962p:-:*:*:*:*:*:*:*", matchCriteriaId: "85F44E9E-D6E6-44CB-A724-143EE7D74691", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "411D132F-5340-4EFF-AC02-CF4AAB9320F4", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*", matchCriteriaId: "12460F51-25AB-4EA9-BC43-9CE8DA992D75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "070AFC36-DFCF-4511-9B72-BCC5E37F5A21", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*", matchCriteriaId: "9C188F12-157F-4B8C-9A66-678B933E20F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63F379DA-0262-438F-9689-1D7824257A3A", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*", matchCriteriaId: "B846175B-4DC0-4268-AAF2-F266BFD7646E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E695FA8-7DC9-483B-89BC-9A55AA69C500", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*", matchCriteriaId: "CD217200-9848-425F-B113-E624C027BC9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BAE83225-B91F-4A39-B3C9-35551B85A61C", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*", matchCriteriaId: "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3AB34C6-A18C-425F-BC75-E4729FDBA462", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*", matchCriteriaId: "FB5ABFF7-F5DA-485F-976B-5C858B85E994", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD74FED6-4AC0-4BB8-A32D-D849350968B0", versionEndExcluding: "4.3.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*", matchCriteriaId: "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE8DBA39-B28F-4901-860E-DE550A8FADA9", versionEndExcluding: "4.3.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*", matchCriteriaId: "D4318B8A-B94C-4207-9731-76D35DE85034", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B3BC6B8-6B4C-4794-9394-479DF40C7F5A", versionEndExcluding: "3.9.7.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*", matchCriteriaId: "167336E2-AAA8-4424-AB07-2D7C9E1542B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2952p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF2DE13B-8494-4E98-B18A-2EA35D9A7650", versionEndExcluding: "3.9.7.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2952p:-:*:*:*:*:*:*:*", matchCriteriaId: "00F421E8-00BE-4451-A948-0D9862E442E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0996CFA6-AA5C-4EFD-BD9E-1B0F23F03804", versionEndExcluding: "3.9.7.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*", matchCriteriaId: "64955940-3998-4B76-92D1-D9F3FAB874B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76E680BF-6C82-4691-92DA-D4F50E4120BB", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*", matchCriteriaId: "AF1B117B-603D-493C-A804-C18ED332A221", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "66C1DB0D-3F7F-4EF5-9F23-10AC94B4A439", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926n:-:*:*:*:*:*:*:*", matchCriteriaId: "C04C85F3-C187-4F82-87A9-ECAF197ABA30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "957D95D2-3569-4CA0-9C05-279F32B66F44", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926ac:-:*:*:*:*:*:*:*", matchCriteriaId: "65625316-A171-4C06-BFD0-C15A5ACF58A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "82DF224C-6CE9-43FF-A882-0C3989018D00", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926vac:-:*:*:*:*:*:*:*", matchCriteriaId: "059842A3-553B-43A0-A714-15C55DA85752", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EE43891-7DB2-4C48-97B7-9F1F3051EA7D", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926l:-:*:*:*:*:*:*:*", matchCriteriaId: "775E8858-B078-427D-BCB5-6D2B91D17A9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1498B13D-10BA-49D2-8229-ADFCA5F44B20", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926ln:-:*:*:*:*:*:*:*", matchCriteriaId: "9E30F255-ECE9-4E6F-9A22-2826E548C18B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4AB36D6A-658F-4A67-BC7F-045C44A3A322", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926lac:-:*:*:*:*:*:*:*", matchCriteriaId: "D4953A99-AD72-4204-BAA9-D87164349E01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "943EEFDB-8958-41BA-84E7-BB28A218B245", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*", matchCriteriaId: "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E63AB9A5-C5AE-410E-AFA3-D32F69887D9E", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*", matchCriteriaId: "6DF8ECCA-405E-4D60-92ED-7F29F36A985F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4982251-F1DE-46CF-8995-F9B0CAD4D758", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*", matchCriteriaId: "CB77A5C7-026C-4172-970A-28E0D1A6F2D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0622A4B6-8839-4972-AC2A-1634F4241B9A", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*", matchCriteriaId: "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "932AA150-DCEE-4313-92E3-B9AECBD6707B", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*", matchCriteriaId: "DC7469CB-2CDE-4D2D-988A-13A482A59B28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A808791A-0863-44F6-8A13-8EFF8EB8C727", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*", matchCriteriaId: "60F97B4A-B323-4354-9CAC-60BCB02A44DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "137281B3-B1F6-4EC4-BB8B-8652533E2337", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*", matchCriteriaId: "96B57263-4900-4F2E-AA5C-554B5163F489", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF2D8790-A2EE-4AE1-A2DC-CC54108DD263", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*", matchCriteriaId: "1D1ADB5D-D2CF-464B-9F1C-45F31A032953", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5972D23-8225-48C1-B9A5-F63531B548E1", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*", matchCriteriaId: "6A89BEEB-3F13-4C41-9133-788232DD229B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D38C4B52-81DF-40F2-8760-A25915126158", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*", matchCriteriaId: "2DD1E5ED-6A96-4C4A-87D4-692988479D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EDA1B3E-4B46-451B-9462-6BBFF5A16F28", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*", matchCriteriaId: "F4B71980-6D7A-4B7B-9863-E85CC849ED90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99B65954-02D6-4B76-88F2-5787B1A55729", versionEndExcluding: "3.9.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*", matchCriteriaId: "00DC816E-1840-46F0-97C4-2BA00F5B9E64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7646BDD0-992E-43D6-A5A9-AB5EA5E89FD3", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*", matchCriteriaId: "1878E59C-FB40-435D-940A-8952C56FA88B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "55C8D979-63A8-419F-86CB-CFDBE8C19B2D", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*", matchCriteriaId: "A3F57E3F-8FFB-4A48-8BFD-5245D1EF2B80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03D383A7-C3A8-41E8-8731-04EF97F0CCE1", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*", matchCriteriaId: "196CE92C-805E-4B6A-8EA8-7A49515FB617", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "297393CA-8855-46DD-A229-D46BA338A57C", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*", matchCriteriaId: "4B81C46C-C837-4C10-AE7F-9E98A1A9E15C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56923C0D-7FBF-4110-8220-07D2FFEA30A6", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*", matchCriteriaId: "C1999AE2-3E6E-4D18-8FF1-D2A853B5975F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61F5E418-BA97-4F40-B3E6-AE256FE0EFDD", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*", matchCriteriaId: "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C44183E5-3030-45F1-BE3E-EAA47312E6AB", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*", matchCriteriaId: "47B532B5-386F-4C4C-8554-C73409124306", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E41A4B2-4C20-433F-9285-95909A0AEE3B", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*", matchCriteriaId: "2CEA5BFB-5D2F-44B2-B995-0675243264CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67A1CBE5-09BF-47A6-A6CA-5FF5CEF6670F", versionEndExcluding: "3.9.6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*", matchCriteriaId: "1F97B07D-BC53-42A4-BBA3-D9CF5D474C9E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71348479-95FE-4E66-A068-74DA89C82F6F", versionEndExcluding: "4.2.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", matchCriteriaId: "8E644893-0457-43A9-98AB-9DB37A5C415C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EFE35F98-0304-415F-B8AF-93C17F8DA6CB", versionEndExcluding: "4.2.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", matchCriteriaId: "7E33E647-5883-44FA-9915-34B89090D4E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C0394013-3F27-4ACA-81C1-17399631DF84", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*", matchCriteriaId: "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1355BCF1-FB23-45B9-9201-EA25B2F33920", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*", matchCriteriaId: "77D227B7-1121-4657-A621-AF0C0E766D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EBDB62F3-082E-4763-BAA0-69B78DA16B5C", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*", matchCriteriaId: "AAC1C9BE-31B5-47DD-BE09-0984EE29A957", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3327574-E0DB-4CB4-8BDD-C03F09D0974A", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*", matchCriteriaId: "625DE418-F506-4579-9C25-04DCD0FBC7ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D431985C-61B3-4124-A363-3124D1AAF5CC", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*", matchCriteriaId: "60657812-D3A8-4B1B-B7BE-F629991CB053", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EEB6111E-2063-4CCF-8E50-4E851264FB16", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*", matchCriteriaId: "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F63944F3-F3D4-4240-819F-15694FB71C1D", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*", matchCriteriaId: "7A582D29-85D9-4FC3-B88A-42B947B9D18C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C34C4A04-A6D0-48F9-BDB0-26847CC0EBAE", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*", matchCriteriaId: "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA939906-239F-40DC-B452-8FF64C9907C7", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*", matchCriteriaId: "787134FE-0549-427D-A9CE-32B1C58BC954", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E78CBAA-2D96-43C8-84A1-AF6CB42C8131", versionEndExcluding: "4.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*", matchCriteriaId: "228DC583-B6BC-4948-A167-53C49B6D04B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0928E933-244C-44E7-A7B3-C6009DD12EC2", versionEndExcluding: "3.9.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*", matchCriteriaId: "B0978465-D59F-4C0A-A29F-5D7BE58BA557", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98F02BBA-DADE-48C9-8802-6C170714A3DF", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*", matchCriteriaId: "871448C6-9183-4828-A287-05F5EC6A44F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57E1D55A-45D7-4427-8BF4-197853948E37", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*", matchCriteriaId: "699735FA-D33E-4F32-9584-B15938FB954E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF8F3B5B-F074-4AB1-8F2C-D4680A843781", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*", matchCriteriaId: "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63B4931B-4B4E-4F30-9A53-657746F3AEEF", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C40B478-C28F-430A-A690-5EF9FFB4812E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AA4AF52-76AE-4356-94DD-2033D888ED32", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*", matchCriteriaId: "D4F462E8-6427-4E42-902B-07E8A9366423", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14488AE9-7FDB-466C-A7BF-3DF43F4A9FE6", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*", matchCriteriaId: "8B87FA44-4931-4DC4-89BE-72A591C7C355", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05E1101F-BFCE-479F-9E3C-932D56E42C9A", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*", matchCriteriaId: "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD98A315-7484-442B-A411-CDFCDDDCC625", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*", matchCriteriaId: "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E30E7C6-C4F5-46C4-87F7-E64AD8CA1DAB", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*", matchCriteriaId: "1E82803D-B1DE-4541-913C-9128B313AC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51C16598-52C3-4302-B2EF-4714007904D5", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*", matchCriteriaId: "5295B4DF-DE6C-4725-A22B-1186D5AB1325", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9F93460D-E72A-4F55-8471-476BD86B83BD", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*", matchCriteriaId: "315CA850-DA5C-46E8-90A1-457320A52AA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "962FC4B2-E7AE-4F4F-B6F5-7E71C9EDFFF6", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*", matchCriteriaId: "4504923B-C903-432D-B4D2-287BD0145F3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.", }, { lang: "es", value: "Se ha detectado un problema en determinados routers DrayTek Vigor versiones anteriores a julio de 2022, como el Vigor3910 versiones anteriores a 4.3.1.1. El archivo /cgi-bin/wlogin.cgi presenta un desbordamiento de búfer por medio del nombre de usuario o contraseña al campo aa o ab", }, ], id: "CVE-2022-32548", lastModified: "2024-11-21T07:06:36.290", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "cve@mitre.org", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-29T06:15:09.423", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-06-01 04:15
Modified
2025-01-09 18:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef | Exploit, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*", matchCriteriaId: "FB9A5891-1058-42FE-8D36-987E967D5481", versionEndExcluding: "2.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*", matchCriteriaId: "5A822A86-C784-4AED-B367-4D39609D93E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*", matchCriteriaId: "DB7AFBE0-9E98-4B46-9517-B73509F5944D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*", matchCriteriaId: "77DCACA0-BA44-4691-BAAD-828C54898FBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D6F173D-4339-4842-AC62-5E4C488D6067", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE6602CA-744E-4543-9818-75FC57E83280", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAB8B117-8605-4C4E-990E-7DE09DF79738", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*", matchCriteriaId: "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0604938-0253-466F-914D-300590C82AB1", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*", matchCriteriaId: "AC2E8256-45B6-4CDC-A2A8-60303773F149", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BABC689-A27B-43C3-B402-2CFF1AFF0012", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*", matchCriteriaId: "19676250-FC97-4476-9A26-304DC8E4B872", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FF46332-4269-48FE-8D27-F0642FD08A75", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*", matchCriteriaId: "CBFCBF8D-3FCA-4B17-9337-4BD621372F23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A90A385E-F817-42D4-BB1B-AF37DE3C9491", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*", matchCriteriaId: "3586D962-114E-4CD4-B6D2-8B031BBB01B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C04F98D-5668-4398-8D8B-4CE9340F20A1", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*", matchCriteriaId: "25451714-5AE6-43C7-B1CC-A2ED2486E402", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*", matchCriteriaId: "8724DACC-85AC-4047-8960-27FCF58C5BF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D70A4480-2C9E-4662-8612-23F66A649BA7", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*", matchCriteriaId: "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0983154F-C4BC-413F-B020-085E83D5BB44", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*", matchCriteriaId: "65373D8B-0DA8-4539-9E63-DBBDF493508E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "632A1555-3550-456B-8ED8-49E5929CE38E", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*", matchCriteriaId: "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*", matchCriteriaId: "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B400A32-0E46-4AAC-930F-D73A639C85DA", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*", matchCriteriaId: "2498876A-CDF4-423A-93C1-7337231D25E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*", matchCriteriaId: "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13FEC077-B0A0-4F87-A113-D0131946C358", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*", matchCriteriaId: "F2052075-C2C4-4462-96B7-E3C448B81AD7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05A02352-B3C3-4A92-822B-9B458CB03EAC", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*", matchCriteriaId: "257B6270-8551-4E08-8A04-E8D575407EE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5783487-C7E1-4E14-B37F-EB4E5A68669B", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*", matchCriteriaId: "E73D31F1-2CAA-4837-BC3D-FD4160873334", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5873909E-F741-4139-A29A-DF8D79CA330D", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*", matchCriteriaId: "8015A1DA-A1B4-4EBC-98AC-941583EF8E37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79C369C7-16EA-42CC-9E96-9D868977B632", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*", matchCriteriaId: "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E379F3EF-6789-4897-9B33-EAB954114571", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*", matchCriteriaId: "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10586770-1426-435D-8137-2486A2843219", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*", matchCriteriaId: "787134FE-0549-427D-A9CE-32B1C58BC954", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8919EE4B-349B-435A-8E9C-A4C24504AF02", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*", matchCriteriaId: "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DF64120-5611-41D1-ADC0-2C8F4522A205", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFC418D6-76FF-4208-B649-9650E572B750", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*", matchCriteriaId: "228DC583-B6BC-4948-A167-53C49B6D04B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68D1D724-D590-49FE-A301-C493FA4E50C3", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*", matchCriteriaId: "F653097B-9197-43A9-A9B4-8AA6EAFC5666", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99D00C6D-2DCA-4737-9652-D576585ED712", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*", matchCriteriaId: "7A582D29-85D9-4FC3-B88A-42B947B9D18C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47866545-C9BF-4FCA-ADCA-ED2E44FC4097", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "076A3429-8E00-419F-96D0-40917CEDC328", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*", matchCriteriaId: "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37B22541-27CF-488D-A35B-6E8EB3FD1958", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*", matchCriteriaId: "BC9BF014-B8EA-4DD9-8320-627C3D276596", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4290ACF-3E73-4C09-9001-6A2AC31BF719", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*", matchCriteriaId: "2DD1E5ED-6A96-4C4A-87D4-692988479D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83DA643A-7804-4058-963B-D4F9EF48D368", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*", matchCriteriaId: "F4B71980-6D7A-4B7B-9863-E85CC849ED90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "743D7983-774E-43A2-8D9E-FD7ECFF49208", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*", matchCriteriaId: "00DC816E-1840-46F0-97C4-2BA00F5B9E64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*", matchCriteriaId: "D4318B8A-B94C-4207-9731-76D35DE85034", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7C5B846-1076-498A-9B18-E3AB9CA71664", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*", matchCriteriaId: "77D227B7-1121-4657-A621-AF0C0E766D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*", matchCriteriaId: "9C37EA55-2526-4130-A57C-65950A5DFE57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2933150F-1ACD-4CBB-AF76-52B0EF30D314", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*", matchCriteriaId: "625DE418-F506-4579-9C25-04DCD0FBC7ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C24391FB-6E97-485C-A09E-BDEB991554A8", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*", matchCriteriaId: "AAC1C9BE-31B5-47DD-BE09-0984EE29A957", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE309C25-7405-43CA-84D9-D026995A2C1B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4727DF-9C6B-451F-B0D8-97771723DB79", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*", matchCriteriaId: "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*", matchCriteriaId: "1E82803D-B1DE-4541-913C-9128B313AC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43F53028-CD42-4B00-8E47-6E04ECCD7DB9", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1726990C-A56E-4FA3-A274-0059796DBD5D", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*", matchCriteriaId: "5295B4DF-DE6C-4725-A22B-1186D5AB1325", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45D29250-F220-473C-B50D-CBEBCFF2FACC", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*", matchCriteriaId: "315CA850-DA5C-46E8-90A1-457320A52AA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4D0323-BBDE-4770-956C-343C44C0963B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C7A64C0-9FEF-4B90-B938-80B23AE31172", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*", matchCriteriaId: "4504923B-C903-432D-B4D2-287BD0145F3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27BC97E5-6000-4BB0-990A-63CC9EB7B464", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*", matchCriteriaId: "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0ECC2E3B-9D0A-4599-B183-A8D13486A07E", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*", matchCriteriaId: "699735FA-D33E-4F32-9584-B15938FB954E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA84174C-4735-41D7-AED6-4628A00506CD", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "451A5CEC-8FE1-49AB-B196-BA644E6C6052", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C40B478-C28F-430A-A690-5EF9FFB4812E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0F60FE9-4C8C-4987-BA4D-A013565C0276", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*", matchCriteriaId: "D4F462E8-6427-4E42-902B-07E8A9366423", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DCDD22F-A2FE-4A33-B577-E54434BCA715", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*", matchCriteriaId: "8B87FA44-4931-4DC4-89BE-72A591C7C355", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2F06ECA-134C-4C77-B347-17FCACB23AF1", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*", matchCriteriaId: "6DF8ECCA-405E-4D60-92ED-7F29F36A985F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "409F0831-39FC-406B-9F40-1A819D94E638", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*", matchCriteriaId: "CB77A5C7-026C-4172-970A-28E0D1A6F2D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "60C59833-B82E-411B-8538-EABFE4F14E3A", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*", matchCriteriaId: "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81CF6DA5-1686-46B9-910D-A94DD63F08DC", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*", matchCriteriaId: "DC7469CB-2CDE-4D2D-988A-13A482A59B28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "153F7DFA-1B02-4DFB-8E1E-B651BD09F900", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*", matchCriteriaId: "60F97B4A-B323-4354-9CAC-60BCB02A44DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D42814F5-C33D-43DF-A1B9-A993F7D65881", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "36C33DCB-487D-4CB4-A4C0-2C4B510AF422", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*", matchCriteriaId: "96B57263-4900-4F2E-AA5C-554B5163F489", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04F1AD94-F4F4-467A-A48F-AA4FD46D0191", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*", matchCriteriaId: "6A89BEEB-3F13-4C41-9133-788232DD229B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05478558-3571-47B6-865A-51C382710FFA", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78546B3A-97EB-4700-85EB-04CBED086A1C", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*", matchCriteriaId: "1D1ADB5D-D2CF-464B-9F1C-45F31A032953", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B44F218-4547-4011-B6DB-575CF501A872", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F85CD06-04CC-4A4E-A279-D110D966FAAF", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*", matchCriteriaId: "B22E55C6-F71F-4EA7-B679-895A012B7020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1330489C-DFC4-4403-B656-E4CFFF0101E8", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "534F07F3-622A-4756-9C51-5403C12AA0D6", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*", matchCriteriaId: "9C188F12-157F-4B8C-9A66-678B933E20F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A22DC676-E8C6-4422-942E-55EB3535DB68", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*", matchCriteriaId: "B846175B-4DC0-4268-AAF2-F266BFD7646E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34386461-6500-4653-BF1B-5E5299D0E662", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*", matchCriteriaId: "CD217200-9848-425F-B113-E624C027BC9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "150F7911-3FB3-429B-8974-7CD3D08A2109", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23A09F00-EBA9-4D82-8CC6-99C36095EFB4", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*", matchCriteriaId: "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADE56943-366C-4D0E-8367-1E63C104F1D7", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*", matchCriteriaId: "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B635143B-5C87-4A26-8E99-80D1061586C2", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9217655B-2A6A-457B-A72A-240DABD72ED8", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*", matchCriteriaId: "FB5ABFF7-F5DA-485F-976B-5C858B85E994", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9AA22E6-35C2-4D7D-8521-315F1CF617E6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1513AAB7-E518-4E71-A2C8-D677677F7284", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "AAC3E2A0-797D-4512-98A5-4ACE48EF4225", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "523910EF-FEFF-410B-8256-C7C0CE39649F", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", matchCriteriaId: "BD0C9A21-7CFE-452F-8505-834AB8579D9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E7F61CB-714A-4855-AB07-7281E05D7F72", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", matchCriteriaId: "9FF86645-253A-4BA3-BA2A-2725575C390D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "26E65A66-EEC8-42B7-9787-F55339B70EBE", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E971141F-469A-499D-8F2A-20F8999240DC", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", matchCriteriaId: "894E4DDA-D9BE-441D-B447-B1CE52959347", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C66404FA-6FCE-43B7-8F3C-177FB740C39E", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", matchCriteriaId: "8E644893-0457-43A9-98AB-9DB37A5C415C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "334E4F8A-B695-46A1-8362-4B97FE5CD424", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", matchCriteriaId: "7E33E647-5883-44FA-9915-34B89090D4E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F167623-480E-49F3-869C-4CFD897AF696", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BB13341-7544-4459-B29F-D0F9BEE3001E", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*", matchCriteriaId: "D7194998-2D96-43DE-85B6-35A8E474C695", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23AEEDBE-5556-4358-A955-C4F30D969642", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FA97EBDF-8908-462A-807A-CDBA15AD5952", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*", matchCriteriaId: "71A66A89-CF31-4C63-9562-707C03117104", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.", }, ], id: "CVE-2023-33778", lastModified: "2025-01-09T18:15:26.790", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-06-01T04:15:10.313", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
var-202306-0072
Vulnerability from variot
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-0072", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vigor167", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2620l", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862lac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2832n", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927ax", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorlte 200n", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorswitch p2100", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigorap 960c", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigor2865ax", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862ln", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorswitch g1080", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2765ax", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2862n", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2926 plus", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorap 918r", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigor2927f", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2865vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866ax", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2765ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2865l", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2766ax", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2766vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2135ax", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862lac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2620l", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2865ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2766ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2865vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorap 903", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigor2765ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2135vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2927lac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2865ax", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2620ln", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135ax", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2915ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866lac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862bn", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor165", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2763ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2927f", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2135fvac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor3910", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862b", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorap 1000c", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigor1000b", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2927ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2865ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor166", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2766ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2865lac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2765vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor130", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2866lac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866l", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2862bn", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor165", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorswitch g2121", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2927f", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2915ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorlte 200n", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorswitch p2540xs", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor3910", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2927ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862b", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927ax", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927l", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor167", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2927vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor166", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigorswitch p1282", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "myvigor", scope: "lt", trust: 1, vendor: "draytek", version: "2.3.2", }, { model: "vigor2962", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2865lac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862ln", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2765ax", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862n", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2766vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorswitch g1085", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2866ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2865l", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigorswitch g2280x", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2926 plus", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2866ax", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2862l", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2763ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2135ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2620l", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigorap 1060c", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigor2915ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2832n", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorlte 200n", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862ln", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2765ax", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorap 912c", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigorswitch g2540xs", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor1000b", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor166", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2927ax", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2927lac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2865ax", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2962", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2620ln", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2866l", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorswitch pq2121x", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2763ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigorswitch fx2120", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2766vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2135fvac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2865l", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862lac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorswitch pq2200xb", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2866ax", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862l", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor130", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor1000b", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927lac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorswitch q2121x", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2765vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2865vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2765ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2620ln", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigorswitch q2200x", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2866l", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2927l", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2766ax", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135fvac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135ax", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2866lac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2862ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2962", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862b", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor3910", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2862l", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorswitch g2100", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2927l", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor130", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor167", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2765vac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862ac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2832n", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2862bn", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor165", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2135vac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2865lac", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigorswitch p2280x", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2862n", scope: "gte", trust: 1, vendor: "draytek", version: "4.0.0", }, { model: "vigor2866vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigorap 906", scope: "lt", trust: 1, vendor: "draytek", version: "1.4.0", }, { model: "vigor2866ac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigorswitch g1282", scope: "lt", trust: 1, vendor: "draytek", version: "2.6.7", }, { model: "vigor2766ax", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2862vac", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2926 plus", scope: "lt", trust: 1, vendor: "draytek", version: "3.9.6", }, { model: "vigor2865ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, { model: "vigor2766ac", scope: "lt", trust: 1, vendor: "draytek", version: "4.2.4", }, ], sources: [ { db: "NVD", id: "CVE-2023-33778", }, ], }, cve: "CVE-2023-33778", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2023-33778", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2023-33778", trust: 1, value: "CRITICAL", }, { author: "CNNVD", id: "CNNVD-202306-003", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "CNNVD", id: "CNNVD-202306-003", }, { db: "NVD", id: "CVE-2023-33778", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website", sources: [ { db: "NVD", id: "CVE-2023-33778", }, { db: "VULMON", id: "CVE-2023-33778", }, ], trust: 0.99, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-33778", trust: 1.7, }, { db: "CNNVD", id: "CNNVD-202306-003", trust: 0.6, }, { db: "VULMON", id: "CVE-2023-33778", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2023-33778", }, { db: "CNNVD", id: "CNNVD-202306-003", }, { db: "NVD", id: "CVE-2023-33778", }, ], }, id: "VAR-202306-0072", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 1, }, last_update_date: "2024-08-14T15:05:37.549000Z", problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-798", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2023-33778", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://gist.github.com/ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-33778/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2023-33778", }, { db: "CNNVD", id: "CNNVD-202306-003", }, { db: "NVD", id: "CVE-2023-33778", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2023-33778", }, { db: "CNNVD", id: "CNNVD-202306-003", }, { db: "NVD", id: "CVE-2023-33778", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-06-01T00:00:00", db: "VULMON", id: "CVE-2023-33778", }, { date: "2023-06-01T00:00:00", db: "CNNVD", id: "CNNVD-202306-003", }, { date: "2023-06-01T04:15:10.313000", db: "NVD", id: "CVE-2023-33778", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-06-01T00:00:00", db: "VULMON", id: "CVE-2023-33778", }, { date: "2023-06-12T00:00:00", db: "CNNVD", id: "CNNVD-202306-003", }, { date: "2023-06-09T18:26:41.557000", db: "NVD", id: "CVE-2023-33778", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202306-003", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Draytek Vigor Routers Trust Management Issue Vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-202306-003", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "trust management problem", sources: [ { db: "CNNVD", id: "CNNVD-202306-003", }, ], trust: 0.6, }, }