Search criteria
32 vulnerabilities
CVE-2025-35028 (GCVE-0-2025-35028)
Vulnerability from cvelistv5 – Published: 2025-11-30 21:27 – Updated: 2025-12-01 17:58
VLAI?
Summary
By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).
Severity ?
9.1 (Critical)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| 0x4m4 | HexStrike AI |
Affected:
33267047667b9accfbf0fdac1c1c7ff12f3a5512
(commit-hash)
|
Credits
jippen of AHA!
todb of AHA!
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35028",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-01T17:58:00.817720Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-01T17:58:12.880Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"EnhancedCommandExecutor"
],
"product": "HexStrike AI",
"vendor": "0x4m4",
"versions": [
{
"status": "affected",
"version": "33267047667b9accfbf0fdac1c1c7ff12f3a5512",
"versionType": "commit-hash"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "jippen of AHA!"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb of AHA!"
}
],
"datePublic": "2025-11-30T19:37:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server\u2019s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025)."
}
],
"value": "By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server\u2019s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025)."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The original advisory contains two example working proofs-of-concept exploits (which disclose the running user and the local /etc/passwd file to the remote requestor)."
}
],
"value": "The original advisory contains two example working proofs-of-concept exploits (which disclose the running user and the local /etc/passwd file to the remote requestor)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-01T16:32:34.455Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory",
"technical-description",
"exploit"
],
"url": "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000000111111111111111111111111000000000000000000000000000000000000000000000000000000011"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/0x4m4/hexstrike-ai/issues/115"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "HexStrike AI MCP Server Command Injection",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35028",
"datePublished": "2025-11-30T21:27:56.057Z",
"dateReserved": "2025-04-15T20:41:31.524Z",
"dateUpdated": "2025-12-01T17:58:12.880Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-35021 (GCVE-0-2025-35021)
Vulnerability from cvelistv5 – Published: 2025-11-04 00:23 – Updated: 2025-11-05 14:54
VLAI?
Summary
By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections.
Severity ?
6.5 (Medium)
CWE
- CWE-1188 - Insecure Default Initialization of Resource
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Credits
HD Moore
Tod Beardsley
AHA!
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35021",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-05T14:54:07.847887Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-05T14:54:15.000Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPX",
"vendor": "Abilis",
"versions": [
{
"lessThan": "9.0.7",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "HD Moore"
},
{
"lang": "en",
"type": "reporter",
"value": "Tod Beardsley"
},
{
"lang": "en",
"type": "coordinator",
"value": "AHA!"
}
],
"datePublic": "2025-11-04T00:06:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections."
}
],
"value": "By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1188",
"description": "CWE-1188 Insecure Default Initialization of Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-04T14:55:16.723Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"technical-description",
"third-party-advisory"
],
"url": "https://www.runzero.com/advisories/abilis-cpx-authentication-bypass-cve-2025-35021/"
},
{
"tags": [
"technical-description",
"third-party-advisory"
],
"url": "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111111111011111111110000000000000000000000000000000000000000000000000000000100"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://support.abilis.net/relnotes/cpx2k/R9.0.html#R9.0.7"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Abilis CPX Fallback Shell Connection Relay",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35021",
"datePublished": "2025-11-04T00:23:23.924Z",
"dateReserved": "2025-04-15T20:40:32.308Z",
"dateUpdated": "2025-11-05T14:54:15.000Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-35027 (GCVE-0-2025-35027)
Vulnerability from cvelistv5 – Published: 2025-09-26 06:53 – Updated: 2025-10-07 21:10
VLAI?
Summary
Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script. All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches.
Severity ?
7.3 (High)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
Credits
Andreas Makris
Kevin Finisterre
Konstantin Severov
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35027",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-30T18:04:59.805441Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-30T18:05:04.102Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/Bin4ry/UniPwn"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Go2",
"vendor": "Unitree",
"versions": [
{
"lessThanOrEqual": "1.1.8",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1",
"vendor": "Unitree",
"versions": [
{
"lessThanOrEqual": "1.4.4",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Andreas Makris"
},
{
"lang": "en",
"type": "finder",
"value": "Kevin Finisterre"
},
{
"lang": "en",
"type": "finder",
"value": "Konstantin Severov"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-09-26T06:41:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.\u0026nbsp;All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches."
}
],
"value": "Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 devices, contain a command injection vulnerability. By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the wpa_supplicant_restart.sh shell script.\u00a0All Unitree models use firmware derived from the same codebase (MIT Cheetah), and the two major forks are the G1 (humanoid) and Go2 (quadruped) branches."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A proof-of-concept has been published at the referenced UniPwn Github repo."
}
],
"value": "A proof-of-concept has been published at the referenced UniPwn Github repo."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-07T21:10:12.489Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35027"
},
{
"tags": [
"technical-description"
],
"url": "https://github.com/Bin4ry/UniPwn"
},
{
"tags": [
"media-coverage"
],
"url": "https://spectrum.ieee.org/unitree-robot-exploit"
},
{
"tags": [
"government-resource"
],
"url": "https://x.com/committeeonccp/status/1971250635548033311"
},
{
"tags": [
"related"
],
"url": "https://www.cve.org/cverecord?id=CVE-2025-60017"
},
{
"tags": [
"related"
],
"url": "https://www.cve.org/cverecord?id=CVE-2025-60250"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Unitree Multiple Robotic Products Command Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35027",
"datePublished": "2025-09-26T06:53:49.585Z",
"dateReserved": "2025-04-15T20:41:31.524Z",
"dateUpdated": "2025-10-07T21:10:12.489Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-8452 (GCVE-0-2025-8452)
Vulnerability from cvelistv5 – Published: 2025-08-12 15:23 – Updated: 2025-10-08 13:39
VLAI?
Summary
By using the "uscan" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device's serial number. The eSCL/uscan vector is typically only exposed on the local network. Any discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer. Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password.
Severity ?
4.3 (Medium)
CWE
- CWE-538 - Insertion of Sensitive Information into Externally-Accessible File or Directory
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
Credits
Rob King of AHA! and runZero
Tod Beardsley of AHA!
Stephen Fewer of Rapid7
JPCERT/CC
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-8452",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-12T15:33:27.294573Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-12T15:33:45.044Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DCP-L8410CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZK",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8610CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZK",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8690CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZK",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8900CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZM",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9570CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZM",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9577CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZM",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8610CDW(for Japan)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZD",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9570CDW(for Japan)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZD",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L5218DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L5228DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5510DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5512DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5518DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5510DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5610DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5660DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5662DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5710DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5715DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5718DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5710DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5715DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5717DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5728DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5912DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5915DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6710DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6720DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6810DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6910DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6915DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6915DN CSP",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6912DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6915DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-EX910",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-EX915DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6820DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9610CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.22(S)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9630CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.22(S)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9635CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.22(S)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L9670CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.22(S)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NFC-EX670",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.22(S)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-EX670W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.22(S)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3555CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3560CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3568CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3720CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3740CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3740CDWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3755CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3760CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3765CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3768CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3780CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8340CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8390CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L8395CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L3300CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3515CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3520CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3520CDWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3528CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2600D",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7600DB",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7600D",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2627DWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7620DWB",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7620DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2627DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7640DWB",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2627DWXL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7640DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2605DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L2464DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2622DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2625DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2620DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L2475DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L2465DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2640DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2647DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2640DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2802DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2827DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2806DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2805DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2802DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2800DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2765DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2760DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-B7800DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-B7811DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-B7810DWB",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-B7810DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2835DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2827DWXL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7548W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7558W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7578DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2508DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2518DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7608W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7628DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7638DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7648DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2628DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2548DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2648DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2600DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.09(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FAX-L2800DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.09(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2680DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2660DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.08(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L2480DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2665DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2817DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2807DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2820DWXL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2820DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2861DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2862DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2860DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.08(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2885DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2880DWXL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2886DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2860DWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2880DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.08(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2900DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2900DWXL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7658DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(E)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7650DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(E)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2920DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(E)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2922DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.12(E)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2960DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2980DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L1630W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.05(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L1632W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.05(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L1638W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.06(E)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L1848W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.06(E)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L2395DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2730DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2732DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2750DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "R",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2750DWXL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2751DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2770DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2771DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2730DWR",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2750DWR",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-7195DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "R",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-7895DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "R",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2730DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "R",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L2390DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2530DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2531DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2532DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2535DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2537DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7520DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2550DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2550DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2551DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2551DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2552DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7535DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2690DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2710DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2712DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2710DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2712DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2713DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2715DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2716DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2717DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-B7715DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2530DWR",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2550DNR",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2710DNR",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2710DWR",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZC",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FAX-L2710DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "R",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-7190DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-B7530DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L2550DW(TWN)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-7890DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-B7720DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L2715DW(for Tiwan, Koria)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "V",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-7090DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-7190DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3510CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZA",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3517CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZA",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-L3290CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZA",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3551CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZA",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L3550CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-9030CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3710CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3730CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-9150CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3735CDN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3745CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3750CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-9350CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZE",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L3770CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZA",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6970DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6950DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6902DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6900DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZP",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6800DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6750DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6702DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6700DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5902DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5900DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5850DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5802DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5800DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-8540DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5755DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZP",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5750DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-8530DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5700DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5702DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L5700DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L6600DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5652DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5650DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5602DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5600DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5502DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-L5500DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "ZZ",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-L6900DWG",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "U",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T830DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T835DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T930DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T935DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T530DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.01(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T535DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.01(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T536DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.01(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T730DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.01(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T735DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.01(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T435W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T430W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T436W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T439W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5340DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5345DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J2340DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5340DWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5740DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6540DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6740DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J3540DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J7100CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6540DWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.18(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6940DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J3940DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J7300CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5855DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.25(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5855DW XL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.25(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5800CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.25(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5955DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.25(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6555DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6555DW XL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.19(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6955DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6957DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J7500CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J7600CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6959DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(G)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J7700CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.16(G)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T520W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.21(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T525W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.21(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T720DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T725DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T820DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T825DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.20(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T920DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.23(N)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T925DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.23(N)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T220",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T225",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T226",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T420W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T425W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T426W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T428W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.27(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-C421W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.04(D)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1205W(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1215W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1200W(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1200N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1200WE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4335DW(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4340DW(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4345DW XL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-4340DWE",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4535DW(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4540DW(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4440DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.38(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J4140N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.09(F)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4440N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(G)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4540N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(G)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4940DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(G)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1010DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1012DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.15(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1050DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1170DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.10(G)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1140DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.13(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J526N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J914N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J926N-WB",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(J)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J904N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.11(K)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J739DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J739DWN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(M)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J939DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.13(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J939DWN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.13(L)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1800N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.14(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1700DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.13(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1800DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.13(H)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1800DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1203N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-C1210N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J4143N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.02(A)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J4443N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J4543N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J528N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.04(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J915N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J928N-WB",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.03(B)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J905N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "1.04(C)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J815DW XL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "J",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J805DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "J",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J805DW XL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "J",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J1100DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J995DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J995DW XL",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1300DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J988N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1500N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J1605DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "K",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5845DW(XL)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "N",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5945DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6945DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6947DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-J6000DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "S",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-J6100DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "S",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6997CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6999CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "HL-J6000CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "S",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T4500DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5330DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5335DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J2330DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5730DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5830DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5930DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J2730DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6530DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6730DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J3530DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6930DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Z",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6935DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Z",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J3930DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Z",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6535DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Z",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6580CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "R",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6980CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "S",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6995CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "S",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J5630CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "L",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6583CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "K",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J6983CDW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "N",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T510W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T510W(for China)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "N",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T710W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-T710W(for China)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "N",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T810W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T810W(for China)",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "N",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-T910DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J572DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J491DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J497DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Q",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J772DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J774DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J890DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J895DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J690DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "T",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J572N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J577N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J582N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "W",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J972N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J973N-W/B",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J978N-W/B",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J981N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J982N-W/B",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "Y",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J893N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "X",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J898N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "X",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NFC-J903N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "X",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J738DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J738DWN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J998DN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFC-J998DWN",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "M",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J587N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "F",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J987N-W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "F",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DCP-J987N-B",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "F",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DS/MDS-940DW",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "G(1.7)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-3300W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P(2.28)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-4500W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P(2.28)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-2700We",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P(2.28)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-4300N",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P(2.28)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-4700W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P(2.28)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-4900W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "P(2.28)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-1350W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "C(1.06)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ADS-1800W",
"vendor": "Brother Industries, Ltd",
"versions": [
{
"lessThanOrEqual": "C(1.06)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "e-STUDIO301DN",
"vendor": "Toshiba Tec",
"versions": [
{
"lessThanOrEqual": "M2309191505",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "e-STUDIO302DNF",
"vendor": "Toshiba Tec",
"versions": [
{
"lessThanOrEqual": "M2309191611",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "bizhub 5020i",
"vendor": "Konica Minolta, Inc.",
"versions": [
{
"lessThanOrEqual": "U2406280431 (Ver R)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "bizhub 5000i",
"vendor": "Konica Minolta, Inc.",
"versions": [
{
"lessThanOrEqual": "1.32",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "bizhub 4020i",
"vendor": "Konica Minolta, Inc.",
"versions": [
{
"lessThanOrEqual": "U2406280431 (Ver R)",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "bizhub 4000i",
"vendor": "Konica Minolta, Inc.",
"versions": [
{
"lessThanOrEqual": "1.28",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Rob King of AHA! and runZero"
},
{
"lang": "en",
"type": "coordinator",
"value": "Tod Beardsley of AHA!"
},
{
"lang": "en",
"type": "other",
"value": "Stephen Fewer of Rapid7"
},
{
"lang": "en",
"type": "coordinator",
"value": "JPCERT/CC"
}
],
"datePublic": "2025-08-12T15:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eBy using the \"uscan\" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to\u0026nbsp;CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device\u0027s serial number. The eSCL/uscan vector is typically only exposed on the local network.\u0026nbsp;\u003cspan style=\"background-color: rgba(232, 232, 232, 0.04);\"\u003eAny discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer.\u0026nbsp;Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "By using the \"uscan\" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to\u00a0CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device\u0027s serial number. The eSCL/uscan vector is typically only exposed on the local network.\u00a0Any discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer.\u00a0Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Any discovery service that implements the eSCL specification can be used to exploit this vulnerability. One such implementation is the runZero Explorer, described at\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://help.runzero.com/docs/installing-an-explorer/\"\u003ehttps://help.runzero.com/docs/installing-an-explorer/\u003c/a\u003e."
}
],
"value": "Any discovery service that implements the eSCL specification can be used to exploit this vulnerability. One such implementation is the runZero Explorer, described at\u00a0 https://help.runzero.com/docs/installing-an-explorer/ ."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-538",
"description": "CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-08T13:39:35.427Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.brother.com/g/b/faqend.aspx?c=us\u0026lang=en\u0026prod=group2\u0026faqid=faq00100851_000"
},
{
"tags": [
"third-party-advisory",
"related"
],
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/"
},
{
"tags": [
"exploit"
],
"url": "https://help.runzero.com/docs/installing-an-explorer/"
},
{
"tags": [
"technical-description",
"third-party-advisory"
],
"url": "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001"
},
{
"tags": [
"related"
],
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51977"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Unauthenticated leak of sensitive information affecting multiple models from Brother Industries, Ltd., Toshiba Tec, and Konica Minolta, Inc.",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password (as described in the related vulnerability, CVE-2025-51978) would no longer\u0026nbsp;be the correct password."
}
],
"value": "Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password (as described in the related vulnerability, CVE-2025-51978) would no longer\u00a0be the correct password."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-8452",
"datePublished": "2025-08-12T15:23:00.577Z",
"dateReserved": "2025-08-01T00:49:49.961Z",
"dateUpdated": "2025-10-08T13:39:35.427Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35010 (GCVE-0-2025-35010)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:06 – Updated: 2025-06-09 03:16
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35010",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:15:50.314272Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:16:04.477Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:06:16.368Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35010/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MNPINGTM Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35010",
"datePublished": "2025-06-08T21:06:16.368Z",
"dateReserved": "2025-04-15T20:40:30.572Z",
"dateUpdated": "2025-06-09T03:16:04.477Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35009 (GCVE-0-2025-35009)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:06 – Updated: 2025-06-09 03:17
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35009",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:16:59.379120Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:17:10.831Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:06:05.426Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35009/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MNNETSP Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35009",
"datePublished": "2025-06-08T21:06:05.426Z",
"dateReserved": "2025-04-15T20:40:30.572Z",
"dateUpdated": "2025-06-09T03:17:10.831Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35008 (GCVE-0-2025-35008)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:18
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35008",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:17:45.431505Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:18:02.029Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:05:52.090Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35008/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MMNAME Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35008",
"datePublished": "2025-06-08T21:05:52.090Z",
"dateReserved": "2025-04-15T20:40:30.572Z",
"dateUpdated": "2025-06-09T03:18:02.029Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35007 (GCVE-0-2025-35007)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:18
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35007",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:18:45.423248Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:18:53.105Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:05:38.698Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35007/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MFRULE Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35007",
"datePublished": "2025-06-08T21:05:38.698Z",
"dateReserved": "2025-04-15T20:40:30.571Z",
"dateUpdated": "2025-06-09T03:18:53.105Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35006 (GCVE-0-2025-35006)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:19
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35006",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:19:38.062525Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:19:46.712Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:05:25.706Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35006/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MFPORTFWD Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35006",
"datePublished": "2025-06-08T21:05:25.706Z",
"dateReserved": "2025-04-15T20:40:30.571Z",
"dateUpdated": "2025-06-09T03:19:46.712Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35005 (GCVE-0-2025-35005)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:20
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35005",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:20:43.281393Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:20:54.997Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:05:15.936Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35005/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MFMAC Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35005",
"datePublished": "2025-06-08T21:05:15.936Z",
"dateReserved": "2025-04-15T20:40:30.571Z",
"dateUpdated": "2025-06-09T03:20:54.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-35004 (GCVE-0-2025-35004)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:05 – Updated: 2025-06-09 03:22
VLAI?
Summary
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
Severity ?
7.1 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microhard | IPn4Gii / Bullet-LTE Firmware |
Affected:
0 , ≤ v1.2.0-r1132
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-35004",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:22:06.240054Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T03:22:14.184Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IPn4Gii / Bullet-LTE Firmware",
"vendor": "Microhard",
"versions": [
{
"lessThanOrEqual": "v1.2.0-r1132",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88,\u0026nbsp;\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing.\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88,\u00a0\"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record\u0027s first publishing."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-08T21:05:01.219Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-35004/"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/BulletLTE-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://www.microhardcorp.com/IPn4Gii-NA2.php"
},
{
"tags": [
"product"
],
"url": "https://support.microhardcorp.com/portal/en/kb/articles/ipn4gii-bullet-lte-firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Microhard Bullet-LTE and IPn4Gii AT+MFIP Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-35004",
"datePublished": "2025-06-08T21:05:01.219Z",
"dateReserved": "2025-04-15T20:40:30.571Z",
"dateUpdated": "2025-06-09T03:22:14.184Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32459 (GCVE-0-2025-32459)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:04 – Updated: 2025-06-10 13:22
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32459",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:24:11.770310Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-10T13:22:40.590Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cbr\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:37:45.430Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3460"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna router_command.sh (in the sync_time argument) Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-32459",
"datePublished": "2025-06-08T21:04:25.317Z",
"dateReserved": "2025-04-08T23:41:04.753Z",
"dateUpdated": "2025-06-10T13:22:40.590Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32458 (GCVE-0-2025-32458)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:04 – Updated: 2025-06-10 13:23
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32458",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:25:16.513260Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-10T13:23:10.764Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:39:52.055Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3460"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna router_command.sh (in the get_syslog_from_qtn argument) Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-32458",
"datePublished": "2025-06-08T21:04:12.492Z",
"dateReserved": "2025-04-08T23:41:04.752Z",
"dateUpdated": "2025-06-10T13:23:10.764Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32457 (GCVE-0-2025-32457)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:03 – Updated: 2025-06-10 13:23
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32457",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:27:01.682269Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-10T13:23:32.884Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:39:03.969Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3460"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna router_command.sh (in the get_file_from_qtn argument) Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-32457",
"datePublished": "2025-06-08T21:03:24.532Z",
"dateReserved": "2025-04-08T23:41:04.752Z",
"dateUpdated": "2025-06-10T13:23:32.884Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32456 (GCVE-0-2025-32456)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:03 – Updated: 2025-06-10 13:24
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32456",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T03:27:57.822249Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-10T13:24:14.742Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u0026nbsp;(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:39:25.998Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3460"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna router_command.sh (in the put_file_to_qtn argument) Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-32456",
"datePublished": "2025-06-08T21:03:12.814Z",
"dateReserved": "2025-04-08T23:41:04.752Z",
"dateUpdated": "2025-06-10T13:24:14.742Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32455 (GCVE-0-2025-32455)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:38
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32455",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T15:01:33.594336Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T15:01:41.914Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cbr\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:38:09.297Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3460"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna router_command.sh (in the run_cmd argument) Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-32455",
"datePublished": "2025-06-08T21:02:58.816Z",
"dateReserved": "2025-04-08T23:41:04.752Z",
"dateUpdated": "2025-06-09T18:38:09.297Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3461 (GCVE-0-2025-3461)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:37
VLAI?
Summary
The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
9.1 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3461",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T15:02:18.870403Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T15:02:24.532Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
}
],
"value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:37:14.718Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3461/"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna Telnet Missing Authentication",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-3461",
"datePublished": "2025-06-08T21:02:37.521Z",
"dateReserved": "2025-04-08T23:41:09.376Z",
"dateUpdated": "2025-06-09T18:37:14.718Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3460 (GCVE-0-2025-3460)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:33
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3460",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T15:02:58.903057Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T15:03:04.372Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u0026nbsp;(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:33:57.925Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3460"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna set_tx_pow Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-3460",
"datePublished": "2025-06-08T21:02:24.334Z",
"dateReserved": "2025-04-08T23:41:08.314Z",
"dateUpdated": "2025-06-09T18:33:57.925Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3459 (GCVE-0-2025-3459)
Vulnerability from cvelistv5 – Published: 2025-06-08 21:02 – Updated: 2025-06-09 18:36
VLAI?
Summary
The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Severity ?
7.7 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ON Semiconductor | Quantenna Wi-Fi chipset |
Affected:
0 , ≤ 8.0.0.28
(custom)
|
Credits
Ricky "HeadlessZeke" Lawshae of Keysight
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3459",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T15:03:20.052450Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T15:03:25.025Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Quantenna Wi-Fi chipset",
"vendor": "ON Semiconductor",
"versions": [
{
"lessThanOrEqual": "8.0.0.28",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricky \"HeadlessZeke\" Lawshae of Keysight"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-06-08T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\u003cbr\u003e\u003cp\u003eThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset.\u003c/p\u003e"
}
],
"value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record\u0027s first publishing, though the vendor has released a best practices guide for implementors of this chipset."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:36:35.345Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-3459"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ON Semiconductor Quantenna transmit_file Argument Injection",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-3459",
"datePublished": "2025-06-08T21:02:09.918Z",
"dateReserved": "2025-04-08T23:41:07.346Z",
"dateUpdated": "2025-06-09T18:36:35.345Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-2894 (GCVE-0-2025-2894)
Vulnerability from cvelistv5 – Published: 2025-03-28 02:51 – Updated: 2025-04-03 14:37
VLAI?
Summary
The Go1 also known as "The World's First Intelligence Bionic Quadruped Robot Companion of Consumer Level," contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service.
Severity ?
6.6 (Medium)
CWE
- CWE-912 - Hidden Functionality
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Credits
Andreas Makris
Kevin Finisterre
todb
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2894",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-28T15:40:56.582769Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-28T15:41:30.159Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Go1",
"vendor": "Unitree",
"versions": [
{
"status": "affected",
"version": "2022_05_11_e0d0e617"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Andreas Makris"
},
{
"lang": "en",
"type": "finder",
"value": "Kevin Finisterre"
},
{
"lang": "en",
"type": "coordinator",
"value": "todb"
}
],
"datePublic": "2025-03-28T00:53:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Go1\u0026nbsp;also known as \"The World\u0027s First Intelligence Bionic Quadruped Robot Companion of Consumer Level,\" contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service.\u003cbr\u003e"
}
],
"value": "The Go1\u00a0also known as \"The World\u0027s First Intelligence Bionic Quadruped Robot Companion of Consumer Level,\" contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-912",
"description": "CWE-912: Hidden Functionality",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T14:37:08.450Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"technical-description"
],
"url": "https://github.com/MAVProxyUser/YushuTechUnitreeGo1/blob/main/Unitree_report.pdf"
},
{
"tags": [
"related"
],
"url": "https://x.com/d0tslash/status/1730989109332607208"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/unitreerobotics/unitree_ros/issues/120"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/cve-2025-2894/"
},
{
"tags": [
"media-coverage"
],
"url": "https://www.axios.com/2025/04/01/threat-spotlight-backdoor-in-chinese-robots-future-of-cybersecurity"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unitree Go1 Robot Dog Backdoor Control Channel",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2025-2894",
"datePublished": "2025-03-28T02:51:19.768Z",
"dateReserved": "2025-03-28T00:53:27.892Z",
"dateUpdated": "2025-04-03T14:37:08.450Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-4224 (GCVE-0-2024-4224)
Vulnerability from cvelistv5 – Published: 2024-07-15 20:34 – Updated: 2024-08-01 20:33
VLAI?
Summary
An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator's browser. This issue was fixed in TL-SG1016DE(UN) V7_1.0.1 Build 20240628.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| TP-Link | TL-SG1016DE |
Affected:
0 , ≤ V7.6_1.0.0 Build 20230616
(custom)
|
Credits
73x45!!!!!
s3rv1c3_w34p0n_r34ch3r
Austin Hackers Anonymous!
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:tp-link:tl-sg1016de:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "tl-sg1016de",
"vendor": "tp-link",
"versions": [
{
"status": "affected",
"version": "7.6_1.0.0build20230616"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-4224",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-16T13:11:06.702298Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-16T13:22:39.852Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:33:53.018Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://takeonme.org/cves/CVE-2024-4224.html"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://www.tp-link.com/en/support/download/tl-sg1016de/v7/#Firmware"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "TL-SG1016DE",
"vendor": "TP-Link",
"versions": [
{
"lessThanOrEqual": "V7.6_1.0.0 Build 20230616",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "73x45!!!!!"
},
{
"lang": "en",
"type": "finder",
"value": "s3rv1c3_w34p0n_r34ch3r"
},
{
"lang": "en",
"type": "coordinator",
"value": "Austin Hackers Anonymous!"
}
],
"datePublic": "2024-07-15T18:37:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator\u0027s browser. This issue was fixed in\u0026nbsp;TL-SG1016DE(UN) V7_1.0.1 Build 20240628.\u003cbr\u003e"
}
],
"value": "An authenticated stored cross-site scripting (XSS) exists in the TP-Link TL-SG1016DE affecting version TL-SG1016DE(UN) V7.6_1.0.0 Build 20230616, which could allow an adversary to run JavaScript in an administrator\u0027s browser. This issue was fixed in\u00a0TL-SG1016DE(UN) V7_1.0.1 Build 20240628."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-15T20:34:53.699Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/CVE-2024-4224.html"
},
{
"tags": [
"patch"
],
"url": "https://www.tp-link.com/en/support/download/tl-sg1016de/v7/#Firmware"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "TP-Link TL-SG1016DE XSS",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2024-4224",
"datePublished": "2024-07-15T20:34:53.699Z",
"dateReserved": "2024-04-26T00:34:22.437Z",
"dateUpdated": "2024-08-01T20:33:53.018Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-2056 (GCVE-0-2024-2056)
Vulnerability from cvelistv5 – Published: 2024-03-05 18:57 – Updated: 2025-02-13 17:32
VLAI?
Summary
Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
Severity ?
9.8 (Critical)
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Artica Tech | Artica Proxy |
Affected:
4.50
|
Credits
Jim Becher of KoreLogic, Inc.
Jaggar Henry of KoreLogic, Inc.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:03:38.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://github.com/gvalkov/tailon#security"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2024/Mar/14"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:articatech:artica_proxy:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "artica_proxy",
"vendor": "articatech",
"versions": [
{
"status": "affected",
"version": "4.50"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-2056",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-23T20:29:37.739652Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-23T20:31:03.176Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Artica Proxy",
"vendor": "Artica Tech",
"versions": [
{
"status": "affected",
"version": "4.50"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jim Becher of KoreLogic, Inc."
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jaggar Henry of KoreLogic, Inc."
}
],
"datePublic": "2024-03-05T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the \"tailon\" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at \u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003egvalkov\u0027s \u0027tailon\u0027 GitHub repo\u003c/span\u003e. Using the tailon service, the contents of any file on the Artica Proxy can be viewed."
}
],
"value": "Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the \"tailon\" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov\u0027s \u0027tailon\u0027 GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-552",
"description": "CWE-552 Files or Directories Accessible to External Parties",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T19:00:13.860Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt"
},
{
"tags": [
"related"
],
"url": "https://github.com/gvalkov/tailon#security"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/14"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Artica Proxy Loopback Services Remotely Accessible Unauthenticated",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2024-2056",
"datePublished": "2024-03-05T18:57:03.524Z",
"dateReserved": "2024-03-01T02:03:12.654Z",
"dateUpdated": "2025-02-13T17:32:34.912Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-2055 (GCVE-0-2024-2055)
Vulnerability from cvelistv5 – Published: 2024-03-05 18:56 – Updated: 2025-02-13 17:32
VLAI?
Summary
The "Rich Filemanager" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user.
Severity ?
9.8 (Critical)
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Artica Tech | Artica Proxy |
Affected:
4.50
Affected: 4.40 |
Credits
Jim Becher of KoreLogic, Inc.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:03:38.319Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2024/Mar/13"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:articatech:artica_proxy:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "artica_proxy",
"vendor": "articatech",
"versions": [
{
"status": "affected",
"version": "4.50"
},
{
"status": "affected",
"version": "4.40"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-2055",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-26T15:57:01.965216Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-26T15:57:07.088Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Artica Proxy",
"vendor": "Artica Tech",
"versions": [
{
"status": "affected",
"version": "4.50"
},
{
"status": "affected",
"version": "4.40"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jim Becher of KoreLogic, Inc."
}
],
"datePublic": "2024-03-05T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The \"Rich Filemanager\" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user."
}
],
"value": "The \"Rich Filemanager\" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-552",
"description": "CWE-552 Files or Directories Accessible to External Parties",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T19:00:12.694Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/13"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Artica Proxy Unauthenticated File Manager Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2024-2055",
"datePublished": "2024-03-05T18:56:33.232Z",
"dateReserved": "2024-03-01T02:03:10.598Z",
"dateUpdated": "2025-02-13T17:32:34.287Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-2054 (GCVE-0-2024-2054)
Vulnerability from cvelistv5 – Published: 2024-03-05 18:56 – Updated: 2025-02-13 17:32
VLAI?
Summary
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
Severity ?
9.8 (Critical)
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Artica Tech | Artica Proxy |
Affected:
4.50
|
Credits
Jaggar Henry of KoreLogic, Inc.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:03:38.336Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2024/Mar/12"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "artica_proxy",
"vendor": "articatech",
"versions": [
{
"status": "affected",
"version": "4.50"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-2054",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-05T19:55:54.403524Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-05T19:57:58.912Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Artica Proxy",
"vendor": "Artica Tech",
"versions": [
{
"status": "affected",
"version": "4.50"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jaggar Henry of KoreLogic, Inc."
}
],
"datePublic": "2024-03-05T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user."
}
],
"value": "The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T19:00:11.581Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/12"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Artica Proxy Unauthenticated PHP Deserialization Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2024-2054",
"datePublished": "2024-03-05T18:56:22.972Z",
"dateReserved": "2024-03-01T02:03:08.129Z",
"dateUpdated": "2025-02-13T17:32:33.640Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-2053 (GCVE-0-2024-2053)
Vulnerability from cvelistv5 – Published: 2024-03-05 18:56 – Updated: 2025-02-13 17:32
VLAI?
Summary
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
Severity ?
7.5 (High)
CWE
- CWE-23 - Relative Path Traversal
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Artica Tech | Artica Proxy |
Affected:
4.50
Affected: 4.40 |
Credits
Jaggar Henry of KoreLogic, Inc.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:03:38.417Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2024/Mar/11"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "artica_proxy",
"vendor": "articatech",
"versions": [
{
"status": "affected",
"version": "4.50"
}
]
},
{
"cpes": [
"cpe:2.3:a:articatech:artica_proxy:4.40:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "artica_proxy",
"vendor": "articatech",
"versions": [
{
"status": "affected",
"version": "4.40"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-2053",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T14:50:53.590592Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T14:57:43.547Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Artica Proxy",
"vendor": "Artica Tech",
"versions": [
{
"status": "affected",
"version": "4.50"
},
{
"status": "affected",
"version": "4.40"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jaggar Henry of KoreLogic, Inc."
}
],
"datePublic": "2024-03-05T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user. This issue was demonstrated on version 4.50 of the\u0026nbsp;The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the \"www-data\" user.\u003cbr\u003e"
}
],
"value": "The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user. This issue was demonstrated on version 4.50 of the\u00a0The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the \"www-data\" user."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-23",
"description": "CWE-23 Relative Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T19:00:10.450Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/11"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Artica Proxy Unauthenticated LFI Protection Bypass Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2024-2053",
"datePublished": "2024-03-05T18:56:10.796Z",
"dateReserved": "2024-03-01T02:03:05.828Z",
"dateUpdated": "2025-02-13T17:32:33.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5841 (GCVE-0-2023-5841)
Vulnerability from cvelistv5 – Published: 2024-02-01 18:28 – Updated: 2025-11-04 16:10
VLAI?
Summary
Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.
Severity ?
9.1 (Critical)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Academy Software Foundation | OpenEXR |
Affected:
0 , ≤ 3.2.1
(semver)
Unaffected: 3.2.2 Unaffected: 3.1.12 |
Credits
zenofex
WanderingGlitch
Austin Hackers Anonymous!
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:52.466Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://takeonme.org/cves/CVE-2023-5841.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSB6DB5LAKGPLRXEF5HDNGUMT7GIFT2C/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMINVKQLSUHECXBSQMZFCSDRIHFOJJI/"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Sep/36"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Sep/34"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Sep/32"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-5841",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-15T15:17:50.765495Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-15T15:18:17.317Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "OpenEXR",
"vendor": "Academy Software Foundation",
"versions": [
{
"lessThanOrEqual": "3.2.1",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "3.2.2"
},
{
"status": "unaffected",
"version": "3.1.12"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "zenofex"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "WanderingGlitch"
},
{
"lang": "en",
"type": "coordinator",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Austin Hackers Anonymous!"
}
],
"datePublic": "2024-01-31T22:35:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX\u0026nbsp;image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ev3.2.2 and v3.1.12 of the affected library.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX\u00a0image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions\u00a0v3.2.2 and v3.1.12 of the affected library."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122: Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-25T02:06:23.585Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"url": "https://takeonme.org/cves/CVE-2023-5841.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSB6DB5LAKGPLRXEF5HDNGUMT7GIFT2C/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMINVKQLSUHECXBSQMZFCSDRIHFOJJI/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "OpenEXR Heap Overflow in Scanline Deep Data Parsing",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2023-5841",
"datePublished": "2024-02-01T18:28:05.892Z",
"dateReserved": "2023-10-29T23:41:19.153Z",
"dateUpdated": "2025-11-04T16:10:52.466Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-4504 (GCVE-0-2023-4504)
Vulnerability from cvelistv5 – Published: 2023-09-21 22:47 – Updated: 2025-11-04 16:10
VLAI?
Summary
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Severity ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| OpenPrinting | CUPS |
Affected:
0 , < 2.4.6
(semver)
|
|||||||
|
|||||||||
Credits
zenofex
WanderingGlitch
Austin Hackers Anonymous!
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:38.138Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"technical-description",
"third-party-advisory",
"x_transferred"
],
"url": "https://takeonme.org/cves/CVE-2023-4504.html"
},
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6"
},
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Sep/33"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-4504",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:29:05.900883Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-23T16:16:13.304Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CUPS",
"vendor": "OpenPrinting",
"versions": [
{
"lessThan": "2.4.6",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "libppd",
"vendor": "OpenPrinting",
"versions": [
{
"lessThan": "d09348b",
"status": "affected",
"version": "0",
"versionType": "git"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "zenofex"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "WanderingGlitch"
},
{
"lang": "en",
"type": "coordinator",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Austin Hackers Anonymous!"
}
],
"datePublic": "2023-09-20T12:35:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-07T02:06:38.717Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"technical-description",
"third-party-advisory"
],
"url": "https://takeonme.org/cves/CVE-2023-4504.html"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h"
},
{
"tags": [
"release-notes"
],
"url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "OpenPrinting CUPS/libppd Postscript Parsing Heap Overflow",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2023-4504",
"datePublished": "2023-09-21T22:47:41.879Z",
"dateReserved": "2023-08-23T21:14:04.183Z",
"dateUpdated": "2025-11-04T16:10:38.138Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-2906 (GCVE-0-2023-2906)
Vulnerability from cvelistv5 – Published: 2023-08-25 20:41 – Updated: 2025-11-03 21:47
VLAI?
Summary
Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
Severity ?
No CVSS data available.
CWE
- CWE-369 - Divide By Zero
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Wireshark Foundation | Wireshark |
Affected:
2.0.0 , ≤ 4.0.7
(semver)
|
Credits
zenofex
WanderingGlitch
AHA!
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:47:44.937Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"exploit",
"third-party-advisory",
"technical-description",
"x_transferred"
],
"url": "https://takeonme.org/cves/CVE-2023-2906.html"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19229"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2906",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T14:36:28.624729Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T14:37:16.471Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wireshark",
"vendor": "Wireshark Foundation",
"versions": [
{
"lessThanOrEqual": "4.0.7",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "zenofex"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "WanderingGlitch"
},
{
"lang": "en",
"type": "coordinator",
"user": "00000000-0000-4000-9000-000000000000",
"value": "AHA!"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-369",
"description": "CWE-369 Divide By Zero",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-15T21:06:18.829Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"exploit",
"third-party-advisory",
"technical-description"
],
"url": "https://takeonme.org/cves/CVE-2023-2906.html"
},
{
"tags": [
"patch"
],
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19229"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Wireshark CP2179 divide by zero",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2023-2906",
"datePublished": "2023-08-25T20:41:19.403Z",
"dateReserved": "2023-05-26T00:46:14.391Z",
"dateUpdated": "2025-11-03T21:47:44.937Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-2905 (GCVE-0-2023-2905)
Vulnerability from cvelistv5 – Published: 2023-08-09 04:46 – Updated: 2024-10-10 14:56
VLAI?
Summary
Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.
Severity ?
No CVSS data available.
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Credits
zenofex
WanderingGlitch
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:41:03.925Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"technical-description",
"exploit",
"x_transferred"
],
"url": "https://takeonme.org/cves/CVE-2023-2905.html"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/cesanta/mongoose/pull/2274"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://github.com/cesanta/mongoose/releases/tag/7.11"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2905",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T14:56:20.113651Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T14:56:29.619Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Mongoose",
"vendor": "Cesanta",
"versions": [
{
"status": "affected",
"version": "7.10"
},
{
"status": "unaffected",
"version": "7.11"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "zenofex"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "WanderingGlitch"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to a failure in validating the length of a provided MQTT_CMD_PUBLISH\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eparsed message with a variable length header, Cesanta Mongoose, an\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eembeddable web server, version 7.10 is \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003esusceptible to a heap-based buffer overflow vulnerability in the default configuration. \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVersion 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH\u00a0parsed message with a variable length header, Cesanta Mongoose, an\u00a0embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.\n"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-09T04:46:14.972Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory",
"technical-description",
"exploit"
],
"url": "https://takeonme.org/cves/CVE-2023-2905.html"
},
{
"tags": [
"patch"
],
"url": "https://github.com/cesanta/mongoose/pull/2274"
},
{
"tags": [
"release-notes"
],
"url": "https://github.com/cesanta/mongoose/releases/tag/7.11"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Cesanta Mongoose MQTT Message Parsing Heap Overflow",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2023-2905",
"datePublished": "2023-08-09T04:46:14.972Z",
"dateReserved": "2023-05-26T00:46:11.667Z",
"dateUpdated": "2024-10-10T14:56:29.619Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0667 (GCVE-0-2023-0667)
Vulnerability from cvelistv5 – Published: 2023-06-07 02:38 – Updated: 2025-11-03 21:47
VLAI?
Summary
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Severity ?
6.5 (Medium)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Wireshark Foundation | Wireshark |
Affected:
0 , ≤ 4.0.5
(semver)
Unaffected: 4.0.6 Affected: 0 , ≤ 3.6.13 (semver) Unaffected: 3.6.14 |
Credits
zenofex
WanderingGlitch
Austin Hackers Anonymous!
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:47:02.095Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://takeonme.org/cves/CVE-2023-0667.html"
},
{
"tags": [
"issue-tracking",
"x_transferred"
],
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19086"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202309-02"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-0667",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-06T20:51:10.713632Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-06T20:52:20.014Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wireshark",
"vendor": "Wireshark Foundation",
"versions": [
{
"lessThanOrEqual": "4.0.5",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "4.0.6"
},
{
"lessThanOrEqual": "3.6.13",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "3.6.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "zenofex"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "WanderingGlitch"
},
{
"lang": "en",
"type": "coordinator",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Austin Hackers Anonymous!"
}
],
"datePublic": "2023-05-22T19:04:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark"
}
],
"value": "Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark"
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-17T06:06:23.905Z",
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://takeonme.org/cves/CVE-2023-0667.html"
},
{
"tags": [
"issue-tracking"
],
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19086"
},
{
"url": "https://security.gentoo.org/glsa/202309-02"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Wireshark MSMMS parsing buffer overflow",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"assignerShortName": "AHA",
"cveId": "CVE-2023-0667",
"datePublished": "2023-06-07T02:38:07.798Z",
"dateReserved": "2023-02-03T22:08:34.816Z",
"dateUpdated": "2025-11-03T21:47:02.095Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}