{"id": "CVE-2022-43389", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security@zyxel.com.tw", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 4.7, "exploitabilityScore": 3.9}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2023-01-11T02:15:11.073", "references": [{"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders", "tags": ["Vendor Advisory"], "source": "security@zyxel.com.tw"}, {"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security@zyxel.com.tw", "description": [{"lang": "en", "value": "CWE-120"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-120"}]}], "descriptions": [{"lang": "en", "value": "A buffer overflow vulnerability in the library of the web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device."}, {"lang": "es", "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la librer\u00eda del servidor web en el firmware Zyxel NR7101 anterior a V1.15(ACCC.3)C0, que podr\u00eda permitir que un atacante no autenticado ejecute algunos comandos del sistema operativo o cause condiciones de denegaci\u00f3n de servicio (DoS) en un dispositivo vulnerable."}], "lastModified": "2024-11-21T07:26:22.850", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:lte3202-m437_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEED7B93-7998-429A-9B16-49BAE465704F", "versionEndExcluding": "1.00\\(abwf.1\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:lte3202-m437:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9AFA5A91-B372-464B-9C8E-DFC6552E64EB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:lte3316-m604_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FBDC947-18E3-4A46-A7B3-9AB18032254E", "versionEndExcluding": "2.00\\(abmp.6\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:lte3316-m604:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "557BE1D0-A562-4176-8E59-562E329DD602"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:lte7480-m804_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DFDC741-78E6-42AA-B647-DEE9F04AA2DD", "versionEndExcluding": "1.00\\(abra.6\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E3480021-1538-48ED-BE89-BB0DF562C7DE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:lte7490-m904_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB812F29-2FAE-414C-9047-2471148B1E36", "versionEndExcluding": "1.00\\(abqy.5\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC75F6DE-DCAF-47A0-B6BB-0E050C68AF25"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nebula_fwa510_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7D1CEC6-D45B-4B6A-8A58-B099ADF57413", "versionEndExcluding": "1.15\\(acgd.3\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nebula_fwa510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "80B7099C-DAA5-4902-A62B-B680C9450575"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nebula_fwa710_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB7233D1-3202-471C-AEEA-F76E79F78346", "versionEndExcluding": "1.15\\(acgc.3\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nebula_fwa710:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92221518-C7EA-46D7-8037-A580CEA01093"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nebula_nr7101_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA537481-4311-4C5E-B577-76C8A789FDAC", "versionEndExcluding": "1.15\\(accc.3\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "52096C1F-F73C-413E-9D37-82EFA4703AEC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nr5103_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B98AC59-4E5F-40AC-B6D6-DD669FAFEDCD", "versionEndExcluding": "4.19\\(abyc.3\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nr5103:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C821C282-A1E3-4E31-A0C3-96936A4D90CB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nr5103e_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60ABD202-BEB3-4E0D-98CB-30AAA54E5B3B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nr5103e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "97C7B929-E318-4E17-8AF9-160C8613132D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63A72A80-DA68-4353-8FEA-D372180F8401", "versionEndExcluding": "1.00\\(abuv.7\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E4D27B24-9822-432C-8B8B-9546EE32DEC6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nr7102_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C56958A5-2427-4A9A-BD40-3B548437CA36", "versionEndExcluding": "1.00\\(abyd.2\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F1A15757-DE6F-4A72-9CAD-BAC04BD340A0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:nr7103_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FD95007-25FD-4EF9-A461-19FBB4468B3D", "versionEndExcluding": "1.00\\(accz.1\\)c0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:nr7103:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "77584A2D-D878-46E5-A632-10912DC3B794"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:ep240p_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB5CB3D-4EBA-4C71-886A-5FF336E9F842"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:ep240p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91367DDE-F430-42F7-B4F2-28AEF7FDCB12"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:pm7320-b0_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3B9C504-41A4-4756-BDB0-2EE317F801AE"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:pm7320-b0:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6A479CC-D543-49A1-8A37-7E9D4A0F0009"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:pmg5317-t20b_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1141E1B7-B6B8-496B-A2CA-A9076D805741"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:pmg5317-t20b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9F1334B5-FC76-412F-A7EF-02EEEE677460"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:pmg5617ga_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "366FB20C-6740-431A-A0CA-6EC3FDD3C505"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:pmg5617ga:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9C1B0834-3398-41B0-9A14-7D97768732B4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:zyxel:pmg5622ga_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61E8935-26CD-4664-A95C-1BCA77DBC4DF"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:pmg5622ga:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "840AF834-B7A6-4ACA-BAB9-996D87476D3D"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "security@zyxel.com.tw"}