Vulnerabilites related to draytek - vigorap_903
cve-2020-28968
Vulnerability from cvelistv5
Published
2021-10-22 19:20
Modified
2024-08-04 16:48
Severity ?
Summary
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:48:00.576Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.vulnerability-lab.com/get_content.php?id=2244",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-22T19:20:05",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.vulnerability-lab.com/get_content.php?id=2244",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-28968",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.vulnerability-lab.com/get_content.php?id=2244",
                     refsource: "MISC",
                     url: "https://www.vulnerability-lab.com/get_content.php?id=2244",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-28968",
      datePublished: "2021-10-22T19:20:05",
      dateReserved: "2020-11-19T00:00:00",
      dateUpdated: "2024-08-04T16:48:00.576Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-33778
Vulnerability from cvelistv5
Published
2023-06-01 00:00
Modified
2025-01-09 17:24
Severity ?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T15:47:06.496Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-33778",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-09T17:24:27.672008Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-798",
                        description: "CWE-798 Use of Hard-coded Credentials",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-09T17:24:35.184Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-01T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-33778",
      datePublished: "2023-06-01T00:00:00",
      dateReserved: "2023-05-22T00:00:00",
      dateUpdated: "2025-01-09T17:24:35.184Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2021-10-22 20:15
Modified
2024-11-21 05:23
Summary
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_1000c_firmware:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "742C6089-9E2E-4ECB-AF7E-5D9B894F9AED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_700_firmware:1.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "159E7D7F-6753-4B9D-B68C-EBC8B103523C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83567C7C-880E-4275-9146-A309C12272FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_710_firmware:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "57291C9F-03E6-471E-90AD-9EA3410386CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_710:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88458732-9951-41A4-8FF5-638E1C2849FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_800_firmware:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "89196326-E450-49BD-B6A0-A4CD83F16051",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83AA8C11-D451-4545-8B83-80CB2B20EBB5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_802_firmware:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6F104E-1406-4167-A0C7-00CBF0E1DC9B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_802:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAE5715D-BA12-43D8-913F-3F067DBAE9BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_810_firmware:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3011DC89-E9B5-4359-8715-C9EAE5F5A63A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_810:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4093BE65-79DE-4920-AD37-B0A19E101993",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_900_firmware:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF25D657-6E0A-48FC-9218-ACF6BE1ABC6C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E891B2CB-6EB5-447B-A588-2CB1A99BF407",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_902_firmware:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1023654B-CDFD-485A-92B5-37BD9AAE023E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_902:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8BCD733-094A-42DC-BFFC-C0D77EF5B91F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_903_firmware:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB11C0E7-D52A-4ED2-8F0F-C5D418BE5046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_910c_firmware:1.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6701321-8DF1-4BCF-8BF8-BBFE78720D13",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_910c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2DE2DE3-EB97-45F2-87EF-B7F2B72F036B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_912c_firmware:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B4544C4-4C80-4227-ADFC-24638764CAE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2052075-C2C4-4462-96B7-E3C448B81AD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_918r_firmware:1.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9362C3C6-94A7-49EC-AA3F-CDA1F319366F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "257B6270-8551-4E08-8A04-E8D575407EE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_920r_firmware:1.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A824F6F-744D-4E6A-8319-5615827478DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_920r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CAC188-1AA6-4158-89FE-42D4680F7A02",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.",
      },
      {
         lang: "es",
         value: "Draytek VigorAP 1000C contiene una vulnerabilidad de tipo cross-site scripting (XSS) almacenada en el módulo RADIUS Setting - RADIUS Server Configuration. Esta vulnerabilidad permite a atacantes ejecutar scripts web o HTML arbitrarios por medio de una carga útil diseñada en el campo de entrada username",
      },
   ],
   id: "CVE-2020-28968",
   lastModified: "2024-11-21T05:23:23.830",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-10-22T20:15:11.020",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.vulnerability-lab.com/get_content.php?id=2244",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.vulnerability-lab.com/get_content.php?id=2244",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-01 04:15
Modified
2025-01-09 18:15
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Impacted products
Vendor Product Version
draytek myvigor *
draytek vigorswitch_pq2200xb_firmware *
draytek vigorswitch_pq2200xb -
draytek vigorswitch_pq2121x_firmware *
draytek vigorswitch_pq2121x -
draytek vigorswitch_p2540xs_firmware *
draytek vigorswitch_p2540xs -
draytek vigorswitch_p2280x_firmware *
draytek vigorswitch_p2280x -
draytek vigorswitch_p2100_firmware *
draytek vigorswitch_p2100 -
draytek vigorswitch_q2200x_firmware *
draytek vigorswitch_q2200x -
draytek vigorswitch_q2121x_firmware *
draytek vigorswitch_q2121x -
draytek vigorswitch_g2540xs_firmware *
draytek vigorswitch_g2540xs -
draytek vigorswitch_g2280x_firmware *
draytek vigorswitch_g2280x -
draytek vigorswitch_g2121_firmware *
draytek vigorswitch_g2121 -
draytek vigorswitch_g2100_firmware *
draytek vigorswitch_g2100 -
draytek vigorswitch_fx2120_firmware *
draytek vigorswitch_fx2120 -
draytek vigorswitch_p1282_firmware *
draytek vigorswitch_p1282 -
draytek vigorswitch_g1282_firmware *
draytek vigorswitch_g1282 -
draytek vigorswitch_g1085_firmware *
draytek vigorswitch_g1085 -
draytek vigorswitch_g1080_firmware *
draytek vigorswitch_g1080 -
draytek vigorap_903_firmware *
draytek vigorap_903 -
draytek vigorap_912c_firmware *
draytek vigorap_912c -
draytek vigorap_918r_firmware *
draytek vigorap_918r -
draytek vigorap_1060c_firmware *
draytek vigorap_1060c -
draytek vigorap_906_firmware *
draytek vigorap_906 -
draytek vigorap_960c_firmware *
draytek vigorap_960c -
draytek vigorap_1000c_firmware *
draytek vigorap_1000c -
draytek vigor2766ac_firmware *
draytek vigor2766ac_firmware *
draytek vigor2766ac -
draytek vigor2766ax_firmware *
draytek vigor2766ax_firmware *
draytek vigor2766ax -
draytek vigor2766vac_firmware *
draytek vigor2766vac_firmware *
draytek vigor2766vac -
draytek vigor2765ax_firmware *
draytek vigor2765ax_firmware *
draytek vigor2765ax -
draytek vigor2765vac_firmware *
draytek vigor2765vac_firmware *
draytek vigor2765vac -
draytek vigor2765ac_firmware *
draytek vigor2765ac_firmware *
draytek vigor2765ac -
draytek vigor2763ac_firmware *
draytek vigor2763ac_firmware *
draytek vigor2763ac -
draytek vigor2620l_firmware *
draytek vigor2620l_firmware *
draytek vigor2620l -
draytek vigor2620ln_firmware *
draytek vigor2620ln_firmware *
draytek vigor2620ln -
draytek vigorlte_200n_firmware *
draytek vigorlte_200n_firmware *
draytek vigorlte_200n -
draytek vigor2915ac_firmware *
draytek vigor2915ac_firmware *
draytek vigor2915ac -
draytek vigor2135ac_firmware *
draytek vigor2135ac_firmware *
draytek vigor2135ac -
draytek vigor2135ax_firmware *
draytek vigor2135ax_firmware *
draytek vigor2135ax -
draytek vigor2135fvac_firmware *
draytek vigor2135fvac_firmware *
draytek vigor2135fvac -
draytek vigor2135vac_firmware *
draytek vigor2135vac_firmware *
draytek vigor2135vac -
draytek vigor2866ax_firmware *
draytek vigor2866ax_firmware *
draytek vigor2866ax -
draytek vigor2866ac_firmware *
draytek vigor2866ac_firmware *
draytek vigor2866ac -
draytek vigor2866vac_firmware *
draytek vigor2866vac_firmware *
draytek vigor2866vac -
draytek vigor2866l_firmware *
draytek vigor2866l_firmware *
draytek vigor2866l -
draytek vigor2866lac_firmware *
draytek vigor2866lac_firmware *
draytek vigor2866lac -
draytek vigor2865ac_firmware *
draytek vigor2865ac_firmware *
draytek vigor2865ac -
draytek vigor2865ax_firmware *
draytek vigor2865ax_firmware *
draytek vigor2865ax -
draytek vigor2865vac_firmware *
draytek vigor2865vac_firmware *
draytek vigor2865vac -
draytek vigor2865l_firmware *
draytek vigor2865l_firmware *
draytek vigor2865l -
draytek vigor2865lac_firmware *
draytek vigor2865lac_firmware *
draytek vigor2865lac -
draytek vigor2862n_firmware *
draytek vigor2862n_firmware *
draytek vigor2862n -
draytek vigor2862ac_firmware *
draytek vigor2862ac_firmware *
draytek vigor2862ac -
draytek vigor2862vac_firmware *
draytek vigor2862vac_firmware *
draytek vigor2862vac -
draytek vigor2862b_firmware *
draytek vigor2862b_firmware *
draytek vigor2862b -
draytek vigor2862bn_firmware *
draytek vigor2862bn_firmware *
draytek vigor2862bn -
draytek vigor2862l_firmware *
draytek vigor2862l_firmware *
draytek vigor2862l -
draytek vigor2862lac_firmware *
draytek vigor2862lac_firmware *
draytek vigor2862lac -
draytek vigor2862ln_firmware *
draytek vigor2862ln_firmware *
draytek vigor2862ln -
draytek vigor2832n_firmware *
draytek vigor2832n_firmware *
draytek vigor2832n -
draytek vigor2927ax_firmware *
draytek vigor2927ax_firmware *
draytek vigor2927ax -
draytek vigor2927ac_firmware *
draytek vigor2927ac_firmware *
draytek vigor2927ac -
draytek vigor2927vac_firmware *
draytek vigor2927vac_firmware *
draytek vigor2927vac -
draytek vigor2927f_firmware *
draytek vigor2927f_firmware *
draytek vigor2927f -
draytek vigor2927l_firmware *
draytek vigor2927l_firmware *
draytek vigor2927l -
draytek vigor2927lac_firmware *
draytek vigor2927lac_firmware *
draytek vigor2927lac -
draytek vigor2926_plus_firmware *
draytek vigor2926_plus_firmware *
draytek vigor2926_plus -
draytek vigor2962_firmware *
draytek vigor2962_firmware *
draytek vigor2962 -
draytek vigor1000b_firmware *
draytek vigor1000b_firmware *
draytek vigor1000b -
draytek vigor3910_firmware *
draytek vigor3910_firmware *
draytek vigor3910 -
draytek vigor165_firmware *
draytek vigor165_firmware *
draytek vigor165 -
draytek vigor166_firmware *
draytek vigor166_firmware *
draytek vigor166 -
draytek vigor130_firmware *
draytek vigor130_firmware *
draytek vigor130 -
draytek vigor167_firmware *
draytek vigor167_firmware *
draytek vigor167 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB9A5891-1058-42FE-8D36-987E967D5481",
                     versionEndExcluding: "2.3.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A822A86-C784-4AED-B367-4D39609D93E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB7AFBE0-9E98-4B46-9517-B73509F5944D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77DCACA0-BA44-4691-BAAD-828C54898FBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D6F173D-4339-4842-AC62-5E4C488D6067",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE6602CA-744E-4543-9818-75FC57E83280",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAB8B117-8605-4C4E-990E-7DE09DF79738",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0604938-0253-466F-914D-300590C82AB1",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC2E8256-45B6-4CDC-A2A8-60303773F149",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BABC689-A27B-43C3-B402-2CFF1AFF0012",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19676250-FC97-4476-9A26-304DC8E4B872",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FF46332-4269-48FE-8D27-F0642FD08A75",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBFCBF8D-3FCA-4B17-9337-4BD621372F23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90A385E-F817-42D4-BB1B-AF37DE3C9491",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3586D962-114E-4CD4-B6D2-8B031BBB01B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C04F98D-5668-4398-8D8B-4CE9340F20A1",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25451714-5AE6-43C7-B1CC-A2ED2486E402",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8724DACC-85AC-4047-8960-27FCF58C5BF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D70A4480-2C9E-4662-8612-23F66A649BA7",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0983154F-C4BC-413F-B020-085E83D5BB44",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65373D8B-0DA8-4539-9E63-DBBDF493508E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "632A1555-3550-456B-8ED8-49E5929CE38E",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B400A32-0E46-4AAC-930F-D73A639C85DA",
                     versionEndExcluding: "2.6.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2498876A-CDF4-423A-93C1-7337231D25E2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FEC077-B0A0-4F87-A113-D0131946C358",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2052075-C2C4-4462-96B7-E3C448B81AD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A02352-B3C3-4A92-822B-9B458CB03EAC",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "257B6270-8551-4E08-8A04-E8D575407EE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5783487-C7E1-4E14-B37F-EB4E5A68669B",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E73D31F1-2CAA-4837-BC3D-FD4160873334",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5873909E-F741-4139-A29A-DF8D79CA330D",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8015A1DA-A1B4-4EBC-98AC-941583EF8E37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79C369C7-16EA-42CC-9E96-9D868977B632",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E379F3EF-6789-4897-9B33-EAB954114571",
                     versionEndExcluding: "1.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "10586770-1426-435D-8137-2486A2843219",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "787134FE-0549-427D-A9CE-32B1C58BC954",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8919EE4B-349B-435A-8E9C-A4C24504AF02",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DF64120-5611-41D1-ADC0-2C8F4522A205",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFC418D6-76FF-4208-B649-9650E572B750",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "228DC583-B6BC-4948-A167-53C49B6D04B2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68D1D724-D590-49FE-A301-C493FA4E50C3",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F653097B-9197-43A9-A9B4-8AA6EAFC5666",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "99D00C6D-2DCA-4737-9652-D576585ED712",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A582D29-85D9-4FC3-B88A-42B947B9D18C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "47866545-C9BF-4FCA-ADCA-ED2E44FC4097",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "076A3429-8E00-419F-96D0-40917CEDC328",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B22541-27CF-488D-A35B-6E8EB3FD1958",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC9BF014-B8EA-4DD9-8320-627C3D276596",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4290ACF-3E73-4C09-9001-6A2AC31BF719",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DD1E5ED-6A96-4C4A-87D4-692988479D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83DA643A-7804-4058-963B-D4F9EF48D368",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4B71980-6D7A-4B7B-9863-E85CC849ED90",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "743D7983-774E-43A2-8D9E-FD7ECFF49208",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00DC816E-1840-46F0-97C4-2BA00F5B9E64",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4318B8A-B94C-4207-9731-76D35DE85034",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C5B846-1076-498A-9B18-E3AB9CA71664",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77D227B7-1121-4657-A621-AF0C0E766D90",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C37EA55-2526-4130-A57C-65950A5DFE57",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2933150F-1ACD-4CBB-AF76-52B0EF30D314",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "625DE418-F506-4579-9C25-04DCD0FBC7ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24391FB-6E97-485C-A09E-BDEB991554A8",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC1C9BE-31B5-47DD-BE09-0984EE29A957",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE309C25-7405-43CA-84D9-D026995A2C1B",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A4727DF-9C6B-451F-B0D8-97771723DB79",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E82803D-B1DE-4541-913C-9128B313AC0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F53028-CD42-4B00-8E47-6E04ECCD7DB9",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1726990C-A56E-4FA3-A274-0059796DBD5D",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5295B4DF-DE6C-4725-A22B-1186D5AB1325",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45D29250-F220-473C-B50D-CBEBCFF2FACC",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "315CA850-DA5C-46E8-90A1-457320A52AA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE4D0323-BBDE-4770-956C-343C44C0963B",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C7A64C0-9FEF-4B90-B938-80B23AE31172",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4504923B-C903-432D-B4D2-287BD0145F3B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "27BC97E5-6000-4BB0-990A-63CC9EB7B464",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ECC2E3B-9D0A-4599-B183-A8D13486A07E",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "699735FA-D33E-4F32-9584-B15938FB954E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA84174C-4735-41D7-AED6-4628A00506CD",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "451A5CEC-8FE1-49AB-B196-BA644E6C6052",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C40B478-C28F-430A-A690-5EF9FFB4812E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0F60FE9-4C8C-4987-BA4D-A013565C0276",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4F462E8-6427-4E42-902B-07E8A9366423",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DCDD22F-A2FE-4A33-B577-E54434BCA715",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B87FA44-4931-4DC4-89BE-72A591C7C355",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2F06ECA-134C-4C77-B347-17FCACB23AF1",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DF8ECCA-405E-4D60-92ED-7F29F36A985F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "409F0831-39FC-406B-9F40-1A819D94E638",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB77A5C7-026C-4172-970A-28E0D1A6F2D1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "60C59833-B82E-411B-8538-EABFE4F14E3A",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "81CF6DA5-1686-46B9-910D-A94DD63F08DC",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC7469CB-2CDE-4D2D-988A-13A482A59B28",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "153F7DFA-1B02-4DFB-8E1E-B651BD09F900",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60F97B4A-B323-4354-9CAC-60BCB02A44DE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D42814F5-C33D-43DF-A1B9-A993F7D65881",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36C33DCB-487D-4CB4-A4C0-2C4B510AF422",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96B57263-4900-4F2E-AA5C-554B5163F489",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04F1AD94-F4F4-467A-A48F-AA4FD46D0191",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A89BEEB-3F13-4C41-9133-788232DD229B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05478558-3571-47B6-865A-51C382710FFA",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78546B3A-97EB-4700-85EB-04CBED086A1C",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D1ADB5D-D2CF-464B-9F1C-45F31A032953",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B44F218-4547-4011-B6DB-575CF501A872",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F85CD06-04CC-4A4E-A279-D110D966FAAF",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B22E55C6-F71F-4EA7-B679-895A012B7020",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1330489C-DFC4-4403-B656-E4CFFF0101E8",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "534F07F3-622A-4756-9C51-5403C12AA0D6",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C188F12-157F-4B8C-9A66-678B933E20F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A22DC676-E8C6-4422-942E-55EB3535DB68",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B846175B-4DC0-4268-AAF2-F266BFD7646E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "34386461-6500-4653-BF1B-5E5299D0E662",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD217200-9848-425F-B113-E624C027BC9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "150F7911-3FB3-429B-8974-7CD3D08A2109",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23A09F00-EBA9-4D82-8CC6-99C36095EFB4",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE56943-366C-4D0E-8367-1E63C104F1D7",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B635143B-5C87-4A26-8E99-80D1061586C2",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9217655B-2A6A-457B-A72A-240DABD72ED8",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB5ABFF7-F5DA-485F-976B-5C858B85E994",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9AA22E6-35C2-4D7D-8521-315F1CF617E6",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1513AAB7-E518-4E71-A2C8-D677677F7284",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC3E2A0-797D-4512-98A5-4ACE48EF4225",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "523910EF-FEFF-410B-8256-C7C0CE39649F",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E7F61CB-714A-4855-AB07-7281E05D7F72",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FF86645-253A-4BA3-BA2A-2725575C390D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26E65A66-EEC8-42B7-9787-F55339B70EBE",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E971141F-469A-499D-8F2A-20F8999240DC",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "894E4DDA-D9BE-441D-B447-B1CE52959347",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C66404FA-6FCE-43B7-8F3C-177FB740C39E",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E644893-0457-43A9-98AB-9DB37A5C415C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E4F8A-B695-46A1-8362-4B97FE5CD424",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E33E647-5883-44FA-9915-34B89090D4E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F167623-480E-49F3-869C-4CFD897AF696",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BB13341-7544-4459-B29F-D0F9BEE3001E",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7194998-2D96-43DE-85B6-35A8E474C695",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23AEEDBE-5556-4358-A955-C4F30D969642",
                     versionEndExcluding: "3.9.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA97EBDF-8908-462A-807A-CDBA15AD5952",
                     versionEndExcluding: "4.2.4",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71A66A89-CF31-4C63-9562-707C03117104",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.",
      },
   ],
   id: "CVE-2023-33778",
   lastModified: "2025-01-09T18:15:26.790",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-06-01T04:15:10.313",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}