CVE-2024-27356 (GCVE-0-2024-27356)
Vulnerability from cvelistv5
Published
2024-02-27 00:00
Modified
2025-03-24 15:44
CWE
  • n/a
Summary
An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:34:51.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gl-inet.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt1300:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar750:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar750s:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750s",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:gl.inet:MT6000:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "MT6000",
            "vendor": "gl.inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.5"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:xe3000:4.4.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:x3000:4.4.5:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.5"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt3000:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt2500:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2500",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:axt1800:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "axt1800",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ax1800:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ax1800",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:a1300:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "a1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:s200:4.1.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "s200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.1.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:0300:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "0300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:x750:4.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:sft1200:4.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sft1200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:xe300:4.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar3000m:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar3000m",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar3000m16:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar3000m16",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:b1300:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt300nv2:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt300nv2",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:x300b:3.217:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x300b",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.217"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:s1300:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "s1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:sf1200:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sf1200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mv1000:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mv1000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:n300:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "n300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:b2200:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b2200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-i:x1200:3.203:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x1200",
            "vendor": "gl-i",
            "versions": [
              {
                "status": "affected",
                "version": "3.203"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-27356",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-27T15:51:15.040940Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-200",
                "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-24T15:44:54.024Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-27T00:17:16.406Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gl-inet.com"
        },
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-27356",
    "datePublished": "2024-02-27T00:00:00.000Z",
    "dateReserved": "2024-02-25T00:00:00.000Z",
    "dateUpdated": "2025-03-24T15:44:54.024Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-27356\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-02-27T01:15:07.197\",\"lastModified\":\"2025-09-18T16:27:34.320\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet. Los atacantes pueden descargar archivos, como registros, mediante comandos, obteniendo potencialmente informaci\u00f3n cr\u00edtica del usuario. Esto afecta a MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3. 10 , X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216 y X1200 3.203.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:mt6000_firmware:4.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1F7E41-943A-4479-A948-CC4693837A46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:xe3000_firmware:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB3DD919-EC2B-44CF-AEBD-4EA5A0D52552\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"265EDD5D-B879-4E8A-A6DE-400BC6273A41\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:x3000_firmware:4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6A9FCE-2C4E-4465-ADC8-BEFA227BBF2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9479FFAA-9C87-4530-884D-B96055A3D41C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:mt3000_firmware:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79D3F6BA-60D2-495A-8C74-7E74D3DB25A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF2DBFD-2AE0-41BC-B614-9836098119F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:mt2500_firmware:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4B6800-8A1B-4522-B5E0-9CC4C09DBA2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:axt1800_firmware:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED7B3A1-7DEB-4DB0-AA6E-7D27434BD2CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF453954-BC32-4577-8CE4-066812193495\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:ax1800_firmware:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE60C1C-957D-472A-BB66-21DA80B97099\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB312FD-370C-4DF9-961F-F0C4920AA368\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:a1300_firmware:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD782342-ED71-4BD6-97EB-330F14991957\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:s200_firmware:4.1.4-0300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8770141F-8E4A-4A44-B60C-1011F103FF24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:s200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF1C3533-B1E2-4B96-B235-5BE9951E16BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:x750_firmware:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB74B0F-E141-403A-B480-5B48B9040D4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1EDFF0-F67C-4801-815C-309940BD7338\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:sft1200_firmware:4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26456346-BEE7-4C6D-96D4-8180B31F526F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E656351D-E06E-435F-B1E5-34B89FD8B54B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:xe300_firmware:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B237E3A0-AF65-4CA9-AF31-EA5A6AF05A14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D82B62-F057-42A4-8530-86145AE91AC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:mt1300_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0558E6-FAC8-4569-9AA4-C96823E591C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CECA41F-E807-4234-8C41-477DE132210E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:ar750_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"993B06A2-2BB4-4EBC-904E-802001D9DFEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749A6936-392E-430C-ABD3-33D4C5B3D178\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:ar750s_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD8F61AA-DE3B-44DC-AE73-7D8E807F918E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18E5F1D-55CD-4F6A-A349-90DD27B29955\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:ar300m_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E53CE790-1466-4BB0-933B-33B531C0DD55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F040AC86-5D7A-4E57-B272-A425DDDE1698\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E73FCD-31F7-4BE9-8D16-FB4FDAC685BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3E349B-C40F-4DE6-B977-CF677B2F9814\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:b1300_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1EDB92-F871-4F92-B5CB-9DE24A908D8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47EFE3F-D217-469E-BEE6-5D78037C71C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5BB0698-5585-4511-88EA-7C265EF22F10\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:x300b_firmware:3.217:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC7434D-18F1-4281-B491-62E194F8A265\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83CD9FC-F9BE-4B76-B387-AA2588631780\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8B6BB55-8107-490B-90FD-F7EE3A89C7D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5D0C75-04DE-4315-9980-E8F31AE6F261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5BAAA-AE8C-41F3-8C41-B0223BDB4314\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1BD239-D370-4F14-A6B2-2C078170ECEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF760DF0-D192-4FF8-BC24-F9F71EA365F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F805B376-E08F-4D66-A301-59EF92E4082B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C725432A-2F3B-46F9-B705-34ECC4299FED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB4C645-59AA-4682-A487-C0DB2CF0A4F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gl-inet:x1200_firmware:3.203:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BE6D1D-561D-4A2F-9AC6-F96B8B2DAFB2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:gl-inet:x1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CCE280-ACB1-4057-B08C-4436D33EF156\"}]}]}],\"references\":[{\"url\":\"https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gl-inet.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gl-inet.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://gl-inet.com\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:34:51.986Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27356\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-27T15:51:15.040940Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:gl-inet:mt1300:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"mt1300\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:ar750:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"ar750\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:ar750s:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"ar750s\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:gl.inet:MT6000:-:*:*:*:*:*:*:*\"], \"vendor\": \"gl.inet\", \"product\": \"MT6000\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.5.5\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:xe3000:4.4.4:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"xe3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.4.4\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:x3000:4.4.5:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"x3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.4.5\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:mt3000:4.5.0:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"mt3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.5.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:mt2500:4.5.0:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"mt2500\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.5.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:axt1800:4.5.0:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"axt1800\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.5.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:ax1800:4.5.0:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"ax1800\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.5.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:a1300:4.5.0:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"a1300\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.5.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:s200:4.1.4:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"s200\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.1.4\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:0300:*:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"0300\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.7\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:x750:4.3.7:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"x750\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.7\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:sft1200:4.3.7:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"sft1200\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.7\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:xe300:4.3.7:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"xe300\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.7\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:ar3000m:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"ar3000m\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:ar3000m16:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"ar3000m16\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:b1300:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"b1300\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:mt300nv2:4.3.10:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"mt300nv2\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.10\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:x300b:3.217:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"x300b\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.217\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:s1300:3.216:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"s1300\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.216\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:sf1200:3.216:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"sf1200\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.216\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:mv1000:3.216:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"mv1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.216\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:n300:3.216:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"n300\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.216\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-inet:b2200:3.216:*:*:*:*:*:*:*\"], \"vendor\": \"gl-inet\", \"product\": \"b2200\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.216\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:gl-i:x1200:3.203:*:*:*:*:*:*:*\"], \"vendor\": \"gl-i\", \"product\": \"x1200\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.203\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-07T16:40:16.506Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://gl-inet.com\"}, {\"url\": \"https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-02-27T00:17:16.406Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-27356\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-24T15:44:54.024Z\", \"dateReserved\": \"2024-02-25T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-02-27T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…