Vulnerabilites related to draytek - vigorap_903
cve-2020-28968
Vulnerability from cvelistv5
Published
2021-10-22 19:20
Modified
2024-08-04 16:48
Severity ?
EPSS score ?
Summary
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
References
▼ | URL | Tags |
---|---|---|
https://www.vulnerability-lab.com/get_content.php?id=2244 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T16:48:00.576Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.vulnerability-lab.com/get_content.php?id=2244", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-22T19:20:05", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.vulnerability-lab.com/get_content.php?id=2244", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-28968", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.vulnerability-lab.com/get_content.php?id=2244", refsource: "MISC", url: "https://www.vulnerability-lab.com/get_content.php?id=2244", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-28968", datePublished: "2021-10-22T19:20:05", dateReserved: "2020-11-19T00:00:00", dateUpdated: "2024-08-04T16:48:00.576Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-33778
Vulnerability from cvelistv5
Published
2023-06-01 00:00
Modified
2025-01-09 17:24
Severity ?
EPSS score ?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T15:47:06.496Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-33778", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-09T17:24:27.672008Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "CWE-798 Use of Hard-coded Credentials", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-09T17:24:35.184Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-06-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-33778", datePublished: "2023-06-01T00:00:00", dateReserved: "2023-05-22T00:00:00", dateUpdated: "2025-01-09T17:24:35.184Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2021-10-22 20:15
Modified
2024-11-21 05:23
Severity ?
Summary
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.vulnerability-lab.com/get_content.php?id=2244 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vulnerability-lab.com/get_content.php?id=2244 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
draytek | vigorap_1000c_firmware | 1.3.2 | |
draytek | vigorap_1000c | - | |
draytek | vigorap_700_firmware | 1.11 | |
draytek | vigorap_700 | - | |
draytek | vigorap_710_firmware | 1.2.5 | |
draytek | vigorap_710 | - | |
draytek | vigorap_800_firmware | 1.1.4 | |
draytek | vigorap_800 | - | |
draytek | vigorap_802_firmware | 1.3.2 | |
draytek | vigorap_802 | - | |
draytek | vigorap_810_firmware | 1.2.5 | |
draytek | vigorap_810 | - | |
draytek | vigorap_900_firmware | 1.2.0 | |
draytek | vigorap_900 | - | |
draytek | vigorap_902_firmware | 1.2.5 | |
draytek | vigorap_902 | - | |
draytek | vigorap_903_firmware | 1.3.1 | |
draytek | vigorap_903 | - | |
draytek | vigorap_910c_firmware | 1.2.5 | |
draytek | vigorap_910c | - | |
draytek | vigorap_912c_firmware | 1.3.2 | |
draytek | vigorap_912c | - | |
draytek | vigorap_918r_firmware | 1.3.2 | |
draytek | vigorap_918r | - | |
draytek | vigorap_920r_firmware | 1.3.0 | |
draytek | vigorap_920r | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_1000c_firmware:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "742C6089-9E2E-4ECB-AF7E-5D9B894F9AED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*", matchCriteriaId: "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_700_firmware:1.11:*:*:*:*:*:*:*", matchCriteriaId: "159E7D7F-6753-4B9D-B68C-EBC8B103523C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_700:-:*:*:*:*:*:*:*", matchCriteriaId: "83567C7C-880E-4275-9146-A309C12272FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_710_firmware:1.2.5:*:*:*:*:*:*:*", matchCriteriaId: "57291C9F-03E6-471E-90AD-9EA3410386CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_710:-:*:*:*:*:*:*:*", matchCriteriaId: "88458732-9951-41A4-8FF5-638E1C2849FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_800_firmware:1.1.4:*:*:*:*:*:*:*", matchCriteriaId: "89196326-E450-49BD-B6A0-A4CD83F16051", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_800:-:*:*:*:*:*:*:*", matchCriteriaId: "83AA8C11-D451-4545-8B83-80CB2B20EBB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_802_firmware:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "BE6F104E-1406-4167-A0C7-00CBF0E1DC9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_802:-:*:*:*:*:*:*:*", matchCriteriaId: "DAE5715D-BA12-43D8-913F-3F067DBAE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_810_firmware:1.2.5:*:*:*:*:*:*:*", matchCriteriaId: "3011DC89-E9B5-4359-8715-C9EAE5F5A63A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_810:-:*:*:*:*:*:*:*", matchCriteriaId: "4093BE65-79DE-4920-AD37-B0A19E101993", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_900_firmware:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "DF25D657-6E0A-48FC-9218-ACF6BE1ABC6C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_900:-:*:*:*:*:*:*:*", matchCriteriaId: "E891B2CB-6EB5-447B-A588-2CB1A99BF407", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_902_firmware:1.2.5:*:*:*:*:*:*:*", matchCriteriaId: "1023654B-CDFD-485A-92B5-37BD9AAE023E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_902:-:*:*:*:*:*:*:*", matchCriteriaId: "E8BCD733-094A-42DC-BFFC-C0D77EF5B91F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_903_firmware:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "AB11C0E7-D52A-4ED2-8F0F-C5D418BE5046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*", matchCriteriaId: "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_910c_firmware:1.2.5:*:*:*:*:*:*:*", matchCriteriaId: "D6701321-8DF1-4BCF-8BF8-BBFE78720D13", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_910c:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE2DE3-EB97-45F2-87EF-B7F2B72F036B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_912c_firmware:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "1B4544C4-4C80-4227-ADFC-24638764CAE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*", matchCriteriaId: "F2052075-C2C4-4462-96B7-E3C448B81AD7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_918r_firmware:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "9362C3C6-94A7-49EC-AA3F-CDA1F319366F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*", matchCriteriaId: "257B6270-8551-4E08-8A04-E8D575407EE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_920r_firmware:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "7A824F6F-744D-4E6A-8319-5615827478DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_920r:-:*:*:*:*:*:*:*", matchCriteriaId: "B9CAC188-1AA6-4158-89FE-42D4680F7A02", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.", }, { lang: "es", value: "Draytek VigorAP 1000C contiene una vulnerabilidad de tipo cross-site scripting (XSS) almacenada en el módulo RADIUS Setting - RADIUS Server Configuration. Esta vulnerabilidad permite a atacantes ejecutar scripts web o HTML arbitrarios por medio de una carga útil diseñada en el campo de entrada username", }, ], id: "CVE-2020-28968", lastModified: "2024-11-21T05:23:23.830", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-22T20:15:11.020", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.vulnerability-lab.com/get_content.php?id=2244", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.vulnerability-lab.com/get_content.php?id=2244", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-06-01 04:15
Modified
2025-01-09 18:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef | Exploit, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*", matchCriteriaId: "FB9A5891-1058-42FE-8D36-987E967D5481", versionEndExcluding: "2.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*", matchCriteriaId: "5A822A86-C784-4AED-B367-4D39609D93E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*", matchCriteriaId: "DB7AFBE0-9E98-4B46-9517-B73509F5944D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*", matchCriteriaId: "77DCACA0-BA44-4691-BAAD-828C54898FBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D6F173D-4339-4842-AC62-5E4C488D6067", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE6602CA-744E-4543-9818-75FC57E83280", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAB8B117-8605-4C4E-990E-7DE09DF79738", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*", matchCriteriaId: "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0604938-0253-466F-914D-300590C82AB1", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*", matchCriteriaId: "AC2E8256-45B6-4CDC-A2A8-60303773F149", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BABC689-A27B-43C3-B402-2CFF1AFF0012", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*", matchCriteriaId: "19676250-FC97-4476-9A26-304DC8E4B872", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FF46332-4269-48FE-8D27-F0642FD08A75", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*", matchCriteriaId: "CBFCBF8D-3FCA-4B17-9337-4BD621372F23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A90A385E-F817-42D4-BB1B-AF37DE3C9491", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*", matchCriteriaId: "3586D962-114E-4CD4-B6D2-8B031BBB01B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C04F98D-5668-4398-8D8B-4CE9340F20A1", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*", matchCriteriaId: "25451714-5AE6-43C7-B1CC-A2ED2486E402", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*", matchCriteriaId: "8724DACC-85AC-4047-8960-27FCF58C5BF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D70A4480-2C9E-4662-8612-23F66A649BA7", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*", matchCriteriaId: "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0983154F-C4BC-413F-B020-085E83D5BB44", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*", matchCriteriaId: "65373D8B-0DA8-4539-9E63-DBBDF493508E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "632A1555-3550-456B-8ED8-49E5929CE38E", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*", matchCriteriaId: "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*", matchCriteriaId: "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B400A32-0E46-4AAC-930F-D73A639C85DA", versionEndExcluding: "2.6.7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*", matchCriteriaId: "2498876A-CDF4-423A-93C1-7337231D25E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*", matchCriteriaId: "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13FEC077-B0A0-4F87-A113-D0131946C358", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*", matchCriteriaId: "F2052075-C2C4-4462-96B7-E3C448B81AD7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05A02352-B3C3-4A92-822B-9B458CB03EAC", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*", matchCriteriaId: "257B6270-8551-4E08-8A04-E8D575407EE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5783487-C7E1-4E14-B37F-EB4E5A68669B", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*", matchCriteriaId: "E73D31F1-2CAA-4837-BC3D-FD4160873334", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5873909E-F741-4139-A29A-DF8D79CA330D", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*", matchCriteriaId: "8015A1DA-A1B4-4EBC-98AC-941583EF8E37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79C369C7-16EA-42CC-9E96-9D868977B632", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*", matchCriteriaId: "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E379F3EF-6789-4897-9B33-EAB954114571", versionEndExcluding: "1.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*", matchCriteriaId: "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10586770-1426-435D-8137-2486A2843219", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*", matchCriteriaId: "787134FE-0549-427D-A9CE-32B1C58BC954", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8919EE4B-349B-435A-8E9C-A4C24504AF02", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*", matchCriteriaId: "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DF64120-5611-41D1-ADC0-2C8F4522A205", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFC418D6-76FF-4208-B649-9650E572B750", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*", matchCriteriaId: "228DC583-B6BC-4948-A167-53C49B6D04B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68D1D724-D590-49FE-A301-C493FA4E50C3", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*", matchCriteriaId: "F653097B-9197-43A9-A9B4-8AA6EAFC5666", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99D00C6D-2DCA-4737-9652-D576585ED712", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*", matchCriteriaId: "7A582D29-85D9-4FC3-B88A-42B947B9D18C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47866545-C9BF-4FCA-ADCA-ED2E44FC4097", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "076A3429-8E00-419F-96D0-40917CEDC328", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*", matchCriteriaId: "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37B22541-27CF-488D-A35B-6E8EB3FD1958", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*", matchCriteriaId: "BC9BF014-B8EA-4DD9-8320-627C3D276596", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4290ACF-3E73-4C09-9001-6A2AC31BF719", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*", matchCriteriaId: "2DD1E5ED-6A96-4C4A-87D4-692988479D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83DA643A-7804-4058-963B-D4F9EF48D368", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*", matchCriteriaId: "F4B71980-6D7A-4B7B-9863-E85CC849ED90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "743D7983-774E-43A2-8D9E-FD7ECFF49208", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*", matchCriteriaId: "00DC816E-1840-46F0-97C4-2BA00F5B9E64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*", matchCriteriaId: "D4318B8A-B94C-4207-9731-76D35DE85034", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7C5B846-1076-498A-9B18-E3AB9CA71664", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*", matchCriteriaId: "77D227B7-1121-4657-A621-AF0C0E766D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*", matchCriteriaId: "9C37EA55-2526-4130-A57C-65950A5DFE57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2933150F-1ACD-4CBB-AF76-52B0EF30D314", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*", matchCriteriaId: "625DE418-F506-4579-9C25-04DCD0FBC7ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C24391FB-6E97-485C-A09E-BDEB991554A8", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*", matchCriteriaId: "AAC1C9BE-31B5-47DD-BE09-0984EE29A957", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE309C25-7405-43CA-84D9-D026995A2C1B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4727DF-9C6B-451F-B0D8-97771723DB79", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*", matchCriteriaId: "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*", matchCriteriaId: "1E82803D-B1DE-4541-913C-9128B313AC0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43F53028-CD42-4B00-8E47-6E04ECCD7DB9", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1726990C-A56E-4FA3-A274-0059796DBD5D", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*", matchCriteriaId: "5295B4DF-DE6C-4725-A22B-1186D5AB1325", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45D29250-F220-473C-B50D-CBEBCFF2FACC", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*", matchCriteriaId: "315CA850-DA5C-46E8-90A1-457320A52AA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4D0323-BBDE-4770-956C-343C44C0963B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C7A64C0-9FEF-4B90-B938-80B23AE31172", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*", matchCriteriaId: "4504923B-C903-432D-B4D2-287BD0145F3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27BC97E5-6000-4BB0-990A-63CC9EB7B464", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*", matchCriteriaId: "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0ECC2E3B-9D0A-4599-B183-A8D13486A07E", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*", matchCriteriaId: "699735FA-D33E-4F32-9584-B15938FB954E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA84174C-4735-41D7-AED6-4628A00506CD", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "451A5CEC-8FE1-49AB-B196-BA644E6C6052", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C40B478-C28F-430A-A690-5EF9FFB4812E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0F60FE9-4C8C-4987-BA4D-A013565C0276", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*", matchCriteriaId: "D4F462E8-6427-4E42-902B-07E8A9366423", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DCDD22F-A2FE-4A33-B577-E54434BCA715", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*", matchCriteriaId: "8B87FA44-4931-4DC4-89BE-72A591C7C355", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2F06ECA-134C-4C77-B347-17FCACB23AF1", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*", matchCriteriaId: "6DF8ECCA-405E-4D60-92ED-7F29F36A985F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "409F0831-39FC-406B-9F40-1A819D94E638", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*", matchCriteriaId: "CB77A5C7-026C-4172-970A-28E0D1A6F2D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "60C59833-B82E-411B-8538-EABFE4F14E3A", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*", matchCriteriaId: "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81CF6DA5-1686-46B9-910D-A94DD63F08DC", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*", matchCriteriaId: "DC7469CB-2CDE-4D2D-988A-13A482A59B28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "153F7DFA-1B02-4DFB-8E1E-B651BD09F900", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*", matchCriteriaId: "60F97B4A-B323-4354-9CAC-60BCB02A44DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D42814F5-C33D-43DF-A1B9-A993F7D65881", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "36C33DCB-487D-4CB4-A4C0-2C4B510AF422", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*", matchCriteriaId: "96B57263-4900-4F2E-AA5C-554B5163F489", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04F1AD94-F4F4-467A-A48F-AA4FD46D0191", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*", matchCriteriaId: "6A89BEEB-3F13-4C41-9133-788232DD229B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05478558-3571-47B6-865A-51C382710FFA", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78546B3A-97EB-4700-85EB-04CBED086A1C", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*", matchCriteriaId: "1D1ADB5D-D2CF-464B-9F1C-45F31A032953", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B44F218-4547-4011-B6DB-575CF501A872", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F85CD06-04CC-4A4E-A279-D110D966FAAF", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*", matchCriteriaId: "B22E55C6-F71F-4EA7-B679-895A012B7020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1330489C-DFC4-4403-B656-E4CFFF0101E8", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "534F07F3-622A-4756-9C51-5403C12AA0D6", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*", matchCriteriaId: "9C188F12-157F-4B8C-9A66-678B933E20F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A22DC676-E8C6-4422-942E-55EB3535DB68", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*", matchCriteriaId: "B846175B-4DC0-4268-AAF2-F266BFD7646E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34386461-6500-4653-BF1B-5E5299D0E662", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*", matchCriteriaId: "CD217200-9848-425F-B113-E624C027BC9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "150F7911-3FB3-429B-8974-7CD3D08A2109", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23A09F00-EBA9-4D82-8CC6-99C36095EFB4", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*", matchCriteriaId: "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADE56943-366C-4D0E-8367-1E63C104F1D7", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*", matchCriteriaId: "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B635143B-5C87-4A26-8E99-80D1061586C2", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9217655B-2A6A-457B-A72A-240DABD72ED8", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*", matchCriteriaId: "FB5ABFF7-F5DA-485F-976B-5C858B85E994", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9AA22E6-35C2-4D7D-8521-315F1CF617E6", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1513AAB7-E518-4E71-A2C8-D677677F7284", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*", matchCriteriaId: "AAC3E2A0-797D-4512-98A5-4ACE48EF4225", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "523910EF-FEFF-410B-8256-C7C0CE39649F", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*", matchCriteriaId: "BD0C9A21-7CFE-452F-8505-834AB8579D9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E7F61CB-714A-4855-AB07-7281E05D7F72", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*", matchCriteriaId: "9FF86645-253A-4BA3-BA2A-2725575C390D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "26E65A66-EEC8-42B7-9787-F55339B70EBE", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E971141F-469A-499D-8F2A-20F8999240DC", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", matchCriteriaId: "894E4DDA-D9BE-441D-B447-B1CE52959347", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C66404FA-6FCE-43B7-8F3C-177FB740C39E", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*", matchCriteriaId: "8E644893-0457-43A9-98AB-9DB37A5C415C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "334E4F8A-B695-46A1-8362-4B97FE5CD424", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*", matchCriteriaId: "7E33E647-5883-44FA-9915-34B89090D4E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F167623-480E-49F3-869C-4CFD897AF696", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BB13341-7544-4459-B29F-D0F9BEE3001E", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*", matchCriteriaId: "D7194998-2D96-43DE-85B6-35A8E474C695", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23AEEDBE-5556-4358-A955-C4F30D969642", versionEndExcluding: "3.9.6", vulnerable: true, }, { criteria: "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FA97EBDF-8908-462A-807A-CDBA15AD5952", versionEndExcluding: "4.2.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*", matchCriteriaId: "71A66A89-CF31-4C63-9562-707C03117104", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.", }, ], id: "CVE-2023-33778", lastModified: "2025-01-09T18:15:26.790", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-06-01T04:15:10.313", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }