cve-2023-23313
Vulnerability from cvelistv5
Published
2023-03-03 00:00
Modified
2025-03-07 16:33
Summary
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:28:40.675Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "NONE",
                     baseScore: 6.1,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "LOW",
                     integrityImpact: "LOW",
                     privilegesRequired: "NONE",
                     scope: "CHANGED",
                     userInteraction: "REQUIRED",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-23313",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-07T16:32:55.557112Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-79",
                        description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-07T16:33:57.302Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-19T00:00:00.000Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/",
            },
            {
               url: "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2023-23313",
      datePublished: "2023-03-03T00:00:00.000Z",
      dateReserved: "2023-01-11T00:00:00.000Z",
      dateUpdated: "2025-03-07T16:33:57.302Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2023-23313\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-03-03T22:15:09.690\",\"lastModified\":\"2025-03-07T17:15:16.473\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"C69AB3BE-7E50-4315-AB58-C33C49E8BB30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"266C73DE-BFC6-4F3E-B022-559B3971CA44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"12F8DFDE-A5B0-44C2-ABAF-109058B56134\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"499BAE46-109A-4BD5-BFBD-9EB8FD824196\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860n-plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"7A0B678C-D666-4225-8756-727BFC699284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860n-plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896A175A-89F5-4120-A181-C300FE0C5DF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860vn-plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"6B7D5E6C-F079-422F-B18F-22E8D82D37F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860vn-plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFB93AF-0BD9-499C-AC77-E5B78D2FF51C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"11C4E10B-0C86-4103-87C4-E9154014ECBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED772E6-7A3B-44DA-B0AE-6EDB09C646B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"594D3E56-7A7C-4A17-8BE9-DC08C6AB2662\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"997B7B3F-F81A-4644-BB79-8DC79E6ADD0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"C90047D4-532C-4B75-BACC-CBCC77F82361\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5437856D-50E6-497E-AE7E-15C3D8F2CD41\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2860ln_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"178EE86C-DE2A-42EB-B27E-CC6615BB8618\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2860ln:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE2B9AA-B33E-4689-8765-56603FA3A5EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.3\",\"matchCriteriaId\":\"F4E9EBB3-C5D0-41DC-93F4-9BBCE183A1B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0978465-D59F-4C0A-A29F-5D7BE58BA557\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.3\",\"matchCriteriaId\":\"2E3C1158-B7E0-4B14-ACB8-11C9D080C6E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B22E55C6-F71F-4EA7-B679-895A012B7020\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"D205DD2E-3787-4345-BE2D-639E4576E4F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AB3C84-67CA-4531-85FB-1A56F3C93ABF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"1405F9A0-3D26-4412-8ADE-FBAD8215A860\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"65B95391-36FA-43EB-BFB5-7F6E66FE2161\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787134FE-0549-427D-A9CE-32B1C58BC954\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"95026A20-EB1B-49F4-ADBE-7CD3094C9E92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228DC583-B6BC-4948-A167-53C49B6D04B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"B1FA8A23-F2A8-4EBE-ACEE-99C3879C8AC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60657812-D3A8-4B1B-B7BE-F629991CB053\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"849F90B6-C7AE-437E-8A47-56A64C43EBD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F653097B-9197-43A9-A9B4-8AA6EAFC5666\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"60411E51-9FE5-415F-A5A7-B392B69AFD4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B9AF22-089B-41FB-8E30-BED3E4CE32ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2765va_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"B1DAF2A5-0129-42F3-9157-6D8CEA3B808F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2765va:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA2C3E48-B40E-4E2D-BA7E-111FA3CC5ADA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.2\",\"matchCriteriaId\":\"DEA4A96F-598F-46F6-B634-E34683D72C34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EA9DF5D-6651-455A-9305-C42C0FF51F01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.2\",\"matchCriteriaId\":\"FDB9FADB-2C06-40C9-A895-C5396F9B3BC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9BF014-B8EA-4DD9-8320-627C3D276596\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"247A0B24-5A88-42A1-A54E-566530CE599A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3873B2B9-95C1-4F00-9165-7C4D2A90CDE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"4FE71C5B-EEE1-4903-96A2-47D2B318E6DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B532B5-386F-4C4C-8554-C73409124306\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"B5BC3CD7-1876-45FE-9BB2-37BE9CCC7D8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEA5BFB-5D2F-44B2-B995-0675243264CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"125E3846-5419-474E-B6C7-D407239B43FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F97B07D-BC53-42A4-BBA3-D9CF5D474C9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"ED11EF06-B83B-410C-A2D1-0841CF25F61F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"4003BBE0-09BA-46D0-9683-3855E5F0AAD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C37EA55-2526-4130-A57C-65950A5DFE57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"A16548F6-3D21-4875-B462-FDC5AF9A642A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D227B7-1121-4657-A621-AF0C0E766D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"06507A17-10FC-42CF-A81B-DC5BA7575CFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC1C9BE-31B5-47DD-BE09-0984EE29A957\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"D86329F8-FF42-4477-BE57-A0B25AAB5FBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625DE418-F506-4579-9C25-04DCD0FBC7ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"064DB573-532E-418B-BAED-78AA19B0CADA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1878E59C-FB40-435D-940A-8952C56FA88B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"27258517-C97A-4A9E-AD0A-D27E49E7C39F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F57E3F-8FFB-4A48-8BFD-5245D1EF2B80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"9F1039C4-B2E1-48E2-A177-372B6285C6D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196CE92C-805E-4B6A-8EA8-7A49515FB617\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"D5D3D2B2-8BD4-4654-A801-04E999CC28C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B81C46C-C837-4C10-AE7F-9E98A1A9E15C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.6.5\",\"matchCriteriaId\":\"3A877CD3-16CA-4461-8D1B-A56E242B2B09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1999AE2-3E6E-4D18-8FF1-D2A853B5975F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.2.4.1\",\"matchCriteriaId\":\"A1ADA571-2AA2-46FC-8B0D-74E44C4AE4CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E33E647-5883-44FA-9915-34B89090D4E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.2.4.1\",\"matchCriteriaId\":\"84121576-0E77-4CFB-9C9B-3ABCA7CAC0B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E644893-0457-43A9-98AB-9DB37A5C415C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.8.5.1\",\"matchCriteriaId\":\"C20E7E09-4B2A-4134-B7AB-78EE38FB2001\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7194998-2D96-43DE-85B6-35A8E474C695\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:vigornic_132_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.8.5.1\",\"matchCriteriaId\":\"6062FBA9-6034-44E2-BD4F-1F06BDD291B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:vigornic_132:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B523DCD7-27FA-4376-BB96-A9C8CD39C4B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor3910_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.2.2\",\"matchCriteriaId\":\"4A5DB539-227A-4AAD-A853-D6A88ADAD510\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor3910:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82F03C0D-CCD6-49DA-83DA-54C861551C17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor3220_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.7.4\",\"matchCriteriaId\":\"99B2A2D0-C7EB-4108-97A4-9D97C9EE63E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor3220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A5F144-CB45-472D-8E20-5A04471AD2F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2962_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.2.2\",\"matchCriteriaId\":\"40A252DC-0DC7-4F8A-8E3D-20F08D1CFC8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2962:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9D2786-6228-4AFC-835B-D64AB6116630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2962p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.2.2\",\"matchCriteriaId\":\"6C43C95A-752D-46C0-B79B-4F45D05C6F62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2962p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCDB3A87-7A61-4BB9-9D35-DF1588FFD21C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor1000b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.2.2\",\"matchCriteriaId\":\"FF628882-657A-4417-9664-4A73975E0961\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor1000b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5296C5E-0057-4504-8E18-56A0623F0A82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2952_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.7.4\",\"matchCriteriaId\":\"E5E8EBA6-1221-4FE7-84DE-DFA92E5C7FD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2952:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53EDEDCA-1623-454D-972D-C44A01554702\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2952p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.7.4\",\"matchCriteriaId\":\"5DC5397C-A77D-458A-B599-849283E665D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2952p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76B7DCB-87B3-48C6-92FE-8C85E7B27CB7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"F6E6E369-1A34-4289-89B6-E91E82AB9E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC44B279-5873-43B7-81FE-74249229B099\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"65BDC4C4-8EDC-42E9-B271-14735F65C2B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53101711-7D2A-4C3E-947F-390E266691C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"D2A696E5-AAF2-4191-B4FD-34CCCFD2A296\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00807E08-CA52-4F54-9973-3040DB31B69B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"53F4A065-081B-4C41-B908-B1E1AF183708\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0639DA-FFC8-4836-9582-837E85C25D7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"25E5D1FF-8265-4387-9F9A-E036EF35B8C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E46C5FA7-B751-4567-B88D-2516F6601F26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"9113CCB6-B005-4F8E-8A63-4253781B56B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C180295-BD70-42B3-8F94-937E546DF684\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2927lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.3\",\"matchCriteriaId\":\"53A600B6-8382-4C31-B9E8-DB4D0AC64E64\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2927lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1905D290-A2CD-4E89-8871-E2B868A4706B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"F51AFB18-4BC7-4520-A946-512D32018A48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88E14F7-49FD-4C7C-A464-1472F83C02EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"355C3BC9-3E08-412C-9BF1-272BE1164B04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F710B59-2FD4-4248-AD49-E2AA2A55E60F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"13DADABC-446E-40AD-8DB1-25677CEFCC40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF45B8C-D9C5-4898-9672-01505598538D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"39423B29-38C5-4907-BAA7-D5F8E5CAD41A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F096A7D2-5D76-4E6E-B008-4ADE281F76B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"1640446B-A0D7-4C84-9917-7C3729C1EC17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F652A445-B22C-4CF0-98A0-F28622FC5B18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926ln_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"18979C33-41FC-40FD-9647-180B46ACF28F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926ln:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12F1783-00AE-46AD-A5C6-684C9DC86685\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2926lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"34898CE3-AFB0-4473-8198-A28E5C2199B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2926lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"451679D5-B1A5-4985-A4FC-E2690B773BD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"4A1F5282-0213-434F-B4FA-B26C0408CC12\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEC6EF57-5F16-4D45-851C-E36E91FAD065\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"2672643C-495C-429F-80BC-6F1C52455A05\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80CF03F7-AF76-4868-BCB7-AF1E113BAAFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925n-plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"B0DFB22C-6888-417D-AD46-23CE9F902D97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925n-plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BC8600-C739-4E4B-8088-A8A7DCDD89B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925vn-plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"EA20CC1D-476B-4901-B659-97326A02D6BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925vn-plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7720BC2-0677-4651-87F0-60477FDAE7CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"26DEA194-4872-4C8C-9DBB-668841F729D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D94A36-58AB-482C-B246-DA0C4AB22845\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"A88E3963-3A90-486E-AF8C-CC2FD1A4CB90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B166193F-41B7-4233-857E-F2AF0A588F38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925fn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"1AB1D035-AF79-4823-95A5-FC3E24552327\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925fn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEEEDB58-2691-4996-B0EE-B6A1B37F7B4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"A27F20A0-227B-4E13-87A5-FC3A58B3B4E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE06F34D-6E06-4159-99D6-96A3EC4D9CA8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2925ln_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"1BCFDDA8-DBC1-44D1-8B61-1F0CEAE8E28A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2925ln:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF4FF06-20A1-48A5-B4C1-82CD988CFE0B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2915_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"1DD6F695-46C6-4370-92D4-D85F7889FFA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2915:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C801847-E96C-4A5C-BB2A-D0F7412AF426\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2915ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.2.1\",\"matchCriteriaId\":\"F30B1859-3EDE-4807-90D0-4F08E10CE15A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2915ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC39403-D69A-463A-BC36-01A346F39563\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2866_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"E3E4D76E-C5F3-47C1-9C02-73CAD9536C14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2866:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"916E22AD-6E90-4799-97C1-9B6076BF8692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2866ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"FC62E66F-46B0-413C-8563-561F4FE3C5F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2866ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA51BF57-FE52-4050-AD5A-FE755FE8E304\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2866ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"5CE07C9E-3CA2-494B-AE45-CAAD2CE7C61D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2866ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5CD2EEE-3586-49C6-97CC-A6C35F832A16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2866vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"9A552DF1-0F67-47A3-962D-8C6691F51B85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2866vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1716A531-93C4-44EA-BBF1-10AC412D70FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2866l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"754F101F-CD17-49FC-BB78-B2A25BA814A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2866l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B5C20CF-9216-45B4-82EC-02D0C3890C7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2866lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"2FDF5FFF-C18D-4687-B67C-9474B1914B2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2866lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A121B16-E31F-4A8B-8B22-D1D29DF0CC08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2865_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"F144A7E6-671C-4C42-867F-90019C497626\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2865:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48FB2C00-1224-4089-90EC-096E9B6B7D59\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2865ax_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"A5E63877-6C2E-4DBF-A674-E85DA536C763\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2865ax:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB2B256-D66A-4FCB-9BCD-859207396597\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2865ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"4EFAF008-4AA1-487B-BECE-A6EB3217F541\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2865ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F29220-4011-4E6A-9BD1-5D4BF2A6E30F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2865vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"E460D9A5-52D2-4DC8-8D8A-B241AA8967C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2865vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41FDE27-CF79-4D24-8750-5F3404D0F7DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2865l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"6DEA3DED-9CA8-4DBD-8225-4BED2A8163E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2865l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C7BEA7A-90E2-401E-90CA-531413DDB52E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2865lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.1.1\",\"matchCriteriaId\":\"453FC249-363F-4A07-BFFE-90FBE947DCD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2865lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9256371-2614-4EEC-A3D7-5F3BB640CE65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"97F0BFDD-2741-4199-A7D1-B1D8207C4854\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64FC405E-AE73-4BDE-8AD3-3C9A5114E09C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"84D980BE-6B26-4253-9841-1CFBA2E8640B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99A79B15-EE49-49A9-B73D-2144BD1D0576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"301DE6C8-72CE-4065-89DC-973C16DDBE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7DA0D3-B58F-47C6-9129-405F343D7B6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862vac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"E484FF9C-AD68-4F82-8DC3-BBB660C6F0C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862vac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4625E2E-9266-4EAA-9A1A-CECE2F13621A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"917E51E4-5E83-47E3-BF92-E40F923F4B98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D69821B-8B5E-4524-8BD6-18F8C08C50E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862bn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"D460BD2D-F9C7-4D58-9542-AAAC1A414941\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862bn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B94EF99-BC59-4854-B2F1-40F9C95C6615\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862l_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"98FA8473-6FF6-4D71-9862-464291C664E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA6D5FD5-10A9-4789-B9F9-B001F0EB6F73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862ln_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"6468CE20-2725-410D-8BD2-37CEC1C7D5CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862ln:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6AB1EBB-3ACD-44D1-A161-7FE30151EC30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:draytek:virgor2862lac_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.9.9.1\",\"matchCriteriaId\":\"733009ED-C49D-4C6E-AE9E-9C3257E442D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:draytek:virgor2862lac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659DCBC2-EF52-4EC5-BA5B-CD7E9D7B8221\"}]}]}],\"references\":[{\"url\":\"https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T10:28:40.675Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-23313\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-07T16:32:55.557112Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-07T16:33:51.875Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/\"}, {\"url\": \"https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-05-19T00:00:00.000Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2023-23313\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-07T16:33:57.302Z\", \"dateReserved\": \"2023-01-11T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-03-03T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.