All the vulnerabilites related to tp-link - archer_c50
Vulnerability from fkie_nvd
Published
2022-06-30 23:15
Modified
2024-11-21 07:07
Severity ?
Summary
A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50&A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/cilan2/iot/blob/main/4.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/cilan2/iot/blob/main/4.md | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tp-link | archer_a5_firmware | c50\&a5\(us\)_v5_200407 | |
tp-link | archer_a5 | 5 | |
tp-link | archer_c50_firmware | c50\&a5\(us\)_v5_200407 | |
tp-link | archer_c50 | 5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_a5_firmware:c50\\\u0026a5\\(us\\)_v5_200407:*:*:*:*:*:*:*", "matchCriteriaId": "E22515D1-117E-4765-8F4F-5E8DFEC60C0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_a5:5:*:*:*:*:*:*:*", "matchCriteriaId": "F933E625-EBCD-4B53-A7AB-4E6C68FEFBF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_c50_firmware:c50\\\u0026a5\\(us\\)_v5_200407:*:*:*:*:*:*:*", "matchCriteriaId": "DB0D1CF3-6BFA-4691-B26C-0CFC25F3DCCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c50:5:*:*:*:*:*:*:*", "matchCriteriaId": "9D5797FE-C7D1-4D40-B85A-628508BF3E83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50\u0026A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." }, { "lang": "es", "value": "Un desbordamiento de pila en la funci\u00f3n DM_ In fillobjbystr() de TP-Link Archer versi\u00f3n C50\u0026amp;A5(US)_V5_200407, permite a atacantes causar una Denegaci\u00f3n de Servicio (DoS) por medio de una petici\u00f3n HTTP dise\u00f1ada" } ], "id": "CVE-2022-33087", "lastModified": "2024-11-21T07:07:31.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-30T23:15:08.897", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cilan2/iot/blob/main/4.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cilan2/iot/blob/main/4.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-21 10:15
Modified
2024-11-21 07:38
Severity ?
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | https://vuldb.com/?ctiid.221552 | Permissions Required, Third Party Advisory, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?id.221552 | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?ctiid.221552 | Permissions Required, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.221552 | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tp-link | archer_c50 | v2_160801 | |
tp-link | archer_c50 | 2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_c50:v2_160801:*:*:*:*:*:*:*", "matchCriteriaId": "7EFA2C38-399B-4CD3-AF56-6938BCC1A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c50:2:*:*:*:*:*:*:*", "matchCriteriaId": "FBAF991B-15EB-4858-B7A7-18FA24C180DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552." } ], "id": "CVE-2023-0936", "lastModified": "2024-11-21T07:38:08.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-21T10:15:11.517", "references": [ { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.221552" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.221552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.221552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.221552" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "cna@vuldb.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-25 15:15
Modified
2024-11-21 05:40
Severity ?
Summary
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tp-link | archer_c50 | build_170822 | |
tp-link | archer_c50 | build_171227 | |
tp-link | archer_c50 | build_200318 | |
tp-link | archer_c5 | v3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_c50:build_170822:*:*:*:*:*:*:*", "matchCriteriaId": "E4EDB0E7-E9FE-4371-917A-1258D0CF9D7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:tp-link:archer_c50:build_171227:*:*:*:*:*:*:*", "matchCriteriaId": "DE0474A9-EBA6-474E-BD3B-9F261227032F", "vulnerable": true }, { "criteria": "cpe:2.3:o:tp-link:archer_c50:build_200318:*:*:*:*:*:*:*", "matchCriteriaId": "5762BFD2-3B37-47A8-BBA8-F6403867881B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c5:v3:*:*:*:*:*:*:*", "matchCriteriaId": "C68C3693-6330-4EEE-986F-449194C06190", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field." }, { "lang": "es", "value": "Dispositivos TP-Link Archer C50 versiones V3 anteriores a Build 200318 Rel. 62209, permite a atacantes remotos causar una denegaci\u00f3n de servicio por medio de un Encabezado HTTP dise\u00f1ado que contiene un campo Referer inesperado." } ], "id": "CVE-2020-9375", "lastModified": "2024-11-21T05:40:30.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-25T15:15:11.680", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-08 17:15
Modified
2024-11-21 05:00
Severity ?
Summary
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9EAF0BA-0F00-4EC3-8AD1-38798E302EDF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*", "matchCriteriaId": "96FB9DD1-0AD3-422E-BE39-36D16B259BB3", "versionEndExcluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E4A59C5-BD20-4EF8-BB18-E3EC2AFAB02F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*", "matchCriteriaId": "5324C118-FC2A-4701-A2D4-B149B6F8D82B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "27493F05-2B86-41C9-90F3-29ED4621989F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3B7126-28E1-42F8-98CF-0EC156BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB01CB7-C5BB-49D6-85A7-CECED514C7CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9917176-E908-4110-A641-FED1DFF41C43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE29D9CF-0D42-4C02-8300-364DD9D87553", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADBAEC-12BB-40FB-B013-9E66B7849FE7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A29F002-A941-44B1-9CD3-CC239DCBC1EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA722A34-5071-41A6-8C94-10719DCB0A80", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5772EE0-AAFE-4E11-BE24-05839353E89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FCFF0E3-1CA8-4676-9152-0F9B7E0DAF41", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1EBF0A-5E1B-4B26-97C3-08EFFECD4941", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BD48DC-F9D7-4377-9E08-93AB0416570D", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDD52F9F-7715-424A-B0CD-923507C3AB31", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE9A1753-C59A-447F-9396-F3B4284112DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC93844-D227-42B7-AE09-A439756773BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A52BAA-FCAB-4D01-B533-CDC2230F41B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DFAEE5-8B2C-4940-AC00-2961BC373755", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*", "matchCriteriaId": "FACBCEE3-5F3E-42B8-B6D4-3E945BC8BFD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB8F786A-C18B-4320-8B3D-2572D84BEFE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F20CDA-18E9-4AC7-BC83-0C94A184B398", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*", "matchCriteriaId": "30063847-3DAD-4485-9B38-4C0E8F928E40", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*", "matchCriteriaId": "996C8FE4-5926-4D97-A28F-E371F3AFA876", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DAAA79D-A2A0-408F-B2E0-D88C315D73DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "866A5154-8E94-41C5-8F4F-F4B322986DE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*", "matchCriteriaId": "45362946-1559-42A8-A575-C136A6732B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A17A5E-07EC-4166-BEC1-252A40A85A64", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*", "matchCriteriaId": "606660FF-DBFD-4F88-AF36-125BA4B57D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A109EFF-698F-438E-A9CA-7FDB2BB1E19D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBFA37F9-41D0-496B-B90F-1BD08A0615F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C4F2B72-03BE-49CF-85C6-405CCB0F711C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8970163-15C4-4C35-9976-E03364E6801D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9DA94DA-C428-4143-B8EB-43B8022D98A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB3E78-3AF8-4FE2-A6EC-5F8FE87078A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB98F236-726C-43B4-B391-90052354AFBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0015AA-6FC5-4AA2-8529-A09BFF2F867F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA69799-EA06-407A-92E0-7FFD2C7A9A5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3A6EAD-B58C-4C45-A63E-D4F6E47EDD37", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA924C6-7BEB-4B2A-92E0-EA3BAFA469DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3866E12-99A8-4375-B941-B5967196A392", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4539F8EF-9925-47A7-A3B8-C365B64A476B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA59F9C1-069E-450F-AEEF-8D4D9395B544", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAFD9ED4-1DB1-4150-84EC-DD6377B626E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE84F86-9EDA-47BB-8C83-A3E7505BA776", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6903ED00-1EBC-476A-ADED-650D00113193", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC732835-E3DC-46A2-AF68-0E4F48A44D2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4839445-6775-4DC6-A0F1-D8073EC083BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*", "matchCriteriaId": "99320BB7-7F19-4DF6-B9F6-D854660CFA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D258693F-EAA4-42AA-BDE2-F9F964870DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B50A1E9-B246-44A2-A002-221EAA3A3B70", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1CD0D8-F551-492B-AA36-9E1FCBA66AD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD8A8A3-B906-47D9-9BDE-68A73432F680", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D9E6BE-F3C4-4A2C-8744-976D5F79A408", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D77C54A-B051-4442-A590-C182E9594B81", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4731E44-0726-4BA4-9E0D-9DAA7FF4690C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*", "matchCriteriaId": "84988928-8254-4C49-BB9A-DCF415594E2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8604981-347C-432F-9C69-DD6ED4FB90A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*", "matchCriteriaId": "57DD4D8C-DF38-46CC-9C75-5FDC1C5828B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC111A4D-9EB2-48F8-95C3-279F5F01EFB2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F97B02EA-A8CD-477E-A370-3D801EF04472", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9FF5706-AC17-4CB1-BB94-776149CB04ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35DD32C-853A-42EC-821F-9F6C0E10478F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*", "matchCriteriaId": "39035D44-8C6B-466B-8CDC-4693B1F0F1BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD3E6A5-4BE8-4DEE-8F6A-E687E0E031AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*", "matchCriteriaId": "00206EC6-40E9-44D7-91C2-DED3213BB1E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D667474F-9358-40CF-8B0F-5F31A243412E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D53C5110-F0E4-4E51-97F2-C767BCBD21C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD44558B-C4F7-49FD-AC6C-CE664B707B6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ABCA098-9BB5-4BB2-9BC2-A2F52276A7A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D70E7510-BEDA-45D1-A911-CBB6E0B5E53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5342517-0F54-4C43-9058-67E292B5BF3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF5106EA-B2DC-4674-BA84-BBD9F3B976DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "481E0DF3-C2D3-48C4-9721-7850345F36FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "46E44762-F2B9-4247-874E-8A6AED396653", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2174440D-AC3E-4D24-A561-399643CCD944", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B056A3A9-693E-4BA8-BB42-932569FC41F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*", "matchCriteriaId": "03318A78-FFFF-4431-BE9F-1171613A1014", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*", "matchCriteriaId": "021CD712-FB1B-4D30-BA64-93FD78578B50", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9633C6CB-0BA7-48B8-B4CA-96FF8E4D80D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*", "matchCriteriaId": "87BDB946-A599-4333-8DFE-B0F4E28DA9FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*", "matchCriteriaId": "47285B08-4086-495E-96B6-E56EC8E8525C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD864766-1ADF-40CA-AC4E-D8068C19362B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F85564A-E70B-4A79-8B71-08947DA20186", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D75511-E215-494D-887F-D81B837B90B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB6AD7A-D932-4C02-B2E2-D4C343796A44", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*", "matchCriteriaId": "371A5792-1442-4BE5-B639-DEBF35FF60D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7447513E-A664-49F8-BCDB-041C21E4986A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FA7CDF6-4F2F-4227-AFCF-A7B77CFDBBA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2B45C67-E822-4932-AC44-A41B40C51089", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F24EC840-1FE5-4BE2-95CD-79CA0AD521BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*", "matchCriteriaId": "83089810-0E60-4D5C-8B40-28D54E5C8121", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC960C1-BF3D-41F4-AC85-5BEF4E96F5A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*", "matchCriteriaId": "05D6ABC6-926F-4561-8196-7B0B5F39F3DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0525848-038E-447E-8A69-BDA1227947AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "42FBB9B2-69DB-495D-87D4-F313047660FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7477AAA3-FD6F-4A4F-B3C8-DCF55695991E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D024C1BF-9F18-4D5E-988D-EC1083BA0D01", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EACF115-7053-4EB6-A3F0-47D9D5D2BC8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E5BB174-2D00-4B03-9DCF-32F8A93D3EFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*", "matchCriteriaId": "998C35EB-4B53-4CB7-A0A0-5FFFEF5BD155", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*", "matchCriteriaId": "86B34CE8-A2A4-4F36-8898-138E4B0A542A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB71C71-5E10-43AB-83EA-AF5BD863163D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8A5F418-5FF5-4DB1-92DC-8C3588A10906", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*", "matchCriteriaId": "38F9056F-C3FD-4FC6-BCCD-0501BCEDB3C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3CC1275-CE6D-4C40-9F5A-F799DE82CC31", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5058889-2BCA-4EB3-8F0A-07FF682B50F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*", "matchCriteriaId": "1766FB5C-A6A1-4E61-9D34-4656A862C6F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB77C0E-1B04-4FC6-B5B0-D7FB21A29007", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F138EE5A-CCF6-4B08-8D77-1293FC6C7C58", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3879D0-F71A-45B1-8D9F-ABA4CCA07A81", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "28CF45C7-F897-4BB8-8B6D-6AEEF7B384A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C33C80-F0F4-483F-AC8C-FBA8DD82D05D", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4959F00-BCCF-4C51-B476-019733E14DEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAF045C3-ED70-4913-AF9F-AF2D65DADDCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*", "matchCriteriaId": "036366B3-1FFC-4BA0-B769-EA055BC56C87", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*", "matchCriteriaId": "561002B2-A1BA-42C0-B81D-F3E9133FFFED", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FD7A448-9E0A-4F9D-83EA-3283AB99966A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*", "matchCriteriaId": "7969AB56-208E-432E-A8D5-DE7839492604", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*", "matchCriteriaId": "16666F94-9ED1-4616-9713-DE75F32D1421", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD41ACC2-13C6-4569-80EB-13C490A3BECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*", "matchCriteriaId": "99304D37-E10C-4123-AEB8-EF9A601D7F40", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4A6FE7-D032-4A1F-897A-D35611B3D2D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7E182D8-8E50-44CB-ACE7-FD93672EDD70", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC42C09-AC84-4D62-8C39-7482103AC14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B03E55D-88D8-4A51-8A08-2477E7FAF1F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE91E209-C794-4D54-8313-ABB3755FD69B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3944F997-DBA4-4BCB-8DB1-25C0515A4977", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DDF09AE-17F0-4423-92CC-70B0914A623B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E98A4D36-AB5F-47A3-8E7D-BB514EDA47AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDF0C02A-38C8-447E-80CF-6E020C6CB2A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE40C41-8AB9-4286-B201-1B1FD6430149", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBAA576D-B448-4ABC-B86C-BD0DDC682A95", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC07377-3C14-4E19-8695-9E6EE69D64EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*", "matchCriteriaId": "442B60FE-E431-4AEB-86D4-557D5633BD7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A3BD841-57D0-42C7-85D6-5365A7AC60F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC2A8D7F-5A2F-47D7-B60E-1AD99F34F8D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAEA384D-67F2-4261-BED4-94B9058D91FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5397B5FD-921F-476A-B5F4-F1F9A94518CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E48B3B4C-8CF0-41BB-AFD4-7D8169BCBC2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B01EB68D-D445-431C-8B7C-ED249A364A3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A36C6EBA-1B08-4F7E-BE72-2D502A37EC4E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*", "matchCriteriaId": "4586D249-A8FF-4EAC-8B51-89FE59AC2960", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAAF6995-205A-46FB-B904-E8102727E414", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*", "matchCriteriaId": "18824CB2-0239-4884-9C73-B1B520348C3B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D1D9413-55BE-4A4C-AC5C-ED820E0243B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6E51D01-D179-4956-9F6B-16A4E6F7F9F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*", "matchCriteriaId": "794EF52A-832E-4951-AE3C-8C6149E42909", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "06D75EBF-1E37-486A-BC50-B991E0EA51A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1275DB-E4CB-446D-9AC4-9A02E2F4E98F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*", "matchCriteriaId": "8892CDDD-B5D4-4D10-AA40-CC29846B3F00", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*", "matchCriteriaId": "86BDA5FF-5022-44BE-92C6-5A71AAB06BA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E427C91-DF55-4D55-A650-FF35B804B6CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*", "matchCriteriaId": "623C646C-DCE6-4E2C-98CB-BAA54F41485E", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B8F20D-5433-4F88-89BA-C4CD6A7EFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA5F18F4-1BE4-4518-B2D1-89FD55A0E61C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7CA908F-40A8-40BA-AF4C-467D9FB4B720", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C2B05D5-56EE-4778-A30E-2A8705760511", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A798BB4B-7F4C-4C5E-B3CC-B3BD3668F1BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB97E07-FDAF-46D2-B3F1-7F01D1B093C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B89AC8D-AACC-415C-AB42-6D7712B820EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0875F92-3E39-4958-9240-B7E2FE8601B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD8BB196-69AD-4172-A5D9-229E77A9C81C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3FB392C-FC90-45B3-B0C4-FB8762986417", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEAB5445-7A0D-48A5-B03C-65D7B809BCC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*", "matchCriteriaId": "65D3BE1C-4A96-4153-90AC-893A47B47DFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC025AAE-E85B-45E8-BA94-290097CB4B7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB506DAD-0266-49B6-93A1-1F3BCD7FEA04", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE74089E-9AAA-44BC-9A61-7A4E09789C7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*", "matchCriteriaId": "8543B3C3-0483-480A-9281-458E81A66DA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "019F45ED-891F-4C7E-9236-89F5A3F86653", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*", "matchCriteriaId": "686C6BF0-D822-4CC2-9F9D-F85AA4BBDCAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F699145A-206A-40EA-8820-46DE934E0788", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3855AF-A674-4EC1-A0E7-2A6B99A94C48", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*", "matchCriteriaId": "500F66C5-3054-4126-8926-94DC1432D116", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DBEA162-162B-47C1-AE5E-2B8AB7E8E020", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAA1531A-B518-4408-9254-87743147F4E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA85B6EF-330A-4C99-B355-3563623920A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFA22DA-5C42-4D55-B5D8-CB138B27544F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7D7FD2C-5799-4A72-AA5B-B1A2BADFB664", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C21D2DF-C98C-44BE-8F55-5D345266B69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8966D89-B778-4B46-B28A-1621FA910B9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2521E9E-D61F-46E4-A5DA-35AC996137C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF22F28C-AE05-46C0-A9B8-0D1272147CC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*", "matchCriteriaId": "13463F33-0D5F-4BD7-86BD-85EB0C3ED6ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF59A86-2BF5-44E7-A2E7-3958064D42DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90714920-70C8-402F-A5D0-795B69887B71", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF275372-458E-456A-94DB-0BAB5F9F15A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D183ADD-0776-4E84-8BB2-DFF427F3F666", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B26E254E-F461-42CA-BB26-5B18E2266475", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E225A758-DBDA-40F8-98A8-DD891E173B84", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE13E814-C18C-474A-BC09-F5E01EF84831", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*", "matchCriteriaId": "932FB119-04F3-459E-A414-3F7A240254F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*", "matchCriteriaId": "412A9802-E85D-4547-84B3-44E3F8DC2C18", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E65AC31-6D84-4B54-BF48-98D173185B60", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*", "matchCriteriaId": "3020F448-42AE-4ADB-B362-CD978FCA47EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5BFA2B-0B40-48D0-AE96-E18FF069524B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*", "matchCriteriaId": "78A59121-66F1-4C09-B142-B4C2F898FB3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*", "matchCriteriaId": "28459A79-756A-4E36-AC7A-BAFF63E2CC7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8CB88F-4333-4089-83C3-C45FEC7763E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B8526B-CF07-4291-9403-432CCFD5F54A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5E91F3-FD77-47E6-BBAF-E39AB288C106", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA3591F4-15BB-4DF4-A78A-95618BF8E47E", "vulnerable": true }, { "criteria": "cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*", "matchCriteriaId": "630E70ED-A042-44AC-98D2-0D7A2D088DFF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*", "matchCriteriaId": "A92BA666-CFD5-42D6-AA64-818CC2513642", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*", "matchCriteriaId": "48AE6436-788C-46E2-9F52-9999853919E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "26C70C35-BDEA-4F58-A96B-3E24431D0F00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC86368A-7589-45FC-B9F9-E3D7175F7A96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E878B7D8-06D3-4B94-A3C4-9065B0240790", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "38C0ECB8-909F-47C9-81E5-24384D555A11", "vulnerable": true }, { "criteria": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "53C32749-82A6-42AA-9EBE-11014F161D2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*", "matchCriteriaId": "703AFCFF-7B05-43E5-9600-09431D1AD04B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue." }, { "lang": "es", "value": "La especificaci\u00f3n UPnP de Open Connectivity Foundation antes del 17-04-2020 no proh\u00edbe la aceptaci\u00f3n de una petici\u00f3n de suscripci\u00f3n con una URL de entrega en un segmento de red diferente a la URL de suscripci\u00f3n de evento totalmente calificada, tambi\u00e9n se conoce como el problema de CallStranger" } ], "id": "CVE-2020-12695", "lastModified": "2024-11-21T05:00:05.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-08T17:15:09.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/corelight/callstranger-detector" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.callstranger.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4898" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/corelight/callstranger-detector" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.callstranger.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-18 19:15
Modified
2024-11-21 08:00
Severity ?
Summary
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tp-link | archer_c2_v1_firmware | 170228 | |
tp-link | archer_c2_v1 | - | |
tp-link | archer_c20_firmware | 150707 | |
tp-link | archer_c20 | 1 | |
tp-link | archer_c50_firmware | 160801 | |
tp-link | archer_c50 | 2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_c2_v1_firmware:170228:*:*:*:*:*:*:*", "matchCriteriaId": "E67A17E5-2199-4FFC-A9ED-DA1694CAC531", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c2_v1:-:*:*:*:*:*:*:*", "matchCriteriaId": "10AEB762-E804-46FF-B37D-5CC21A1EFEB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_c20_firmware:150707:*:*:*:*:*:*:*", "matchCriteriaId": "7EBCD60C-2B46-4A7F-821A-2852267A0114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c20:1:*:*:*:*:*:*:*", "matchCriteriaId": "9D159009-CF48-4631-9139-5AB553B58018", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_c50_firmware:160801:*:*:*:*:*:*:*", "matchCriteriaId": "9DD711B4-011F-4576-97FA-20857549E6FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_c50:2:*:*:*:*:*:*:*", "matchCriteriaId": "FBAF991B-15EB-4858-B7A7-18FA24C180DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data." } ], "id": "CVE-2023-30383", "lastModified": "2024-11-21T08:00:07.040", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-18T19:15:09.643", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://tplink.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/a2ure123/a4eda2813d85d8b414bb87e855ab4bf8" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.tp-link.com/us/support/download/archer-c2/v1/#Firmware" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware" }, { "source": "cve@mitre.org", "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware%29%2CTPLINK" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://tplink.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/a2ure123/a4eda2813d85d8b414bb87e855ab4bf8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.tp-link.com/us/support/download/archer-c2/v1/#Firmware" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware%29%2CTPLINK" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-12695
Vulnerability from cvelistv5
Published
2020-06-08 16:45
Modified
2024-08-04 12:04
Severity ?
EPSS score ?
Summary
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:04:22.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.callstranger.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "name": "[oss-security] 20200608 hostapd: UPnP SUBSCRIBE misbehavior in hostapd WPS AP", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/corelight/callstranger-detector" }, { "name": "FEDORA-2020-df3e1cfde9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "name": "FEDORA-2020-1f7fc0d0c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "name": "FEDORA-2020-e538e3e526", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "name": "[debian-lts-announce] 20200806 [SECURITY] [DLA 2315-1] gupnp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "name": "[debian-lts-announce] 20200808 [SECURITY] [DLA 2318-1] wpa security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "name": "USN-4494-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "name": "DSA-4806", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2489-1] minidlna security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "name": "DSA-4898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4898" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T23:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.callstranger.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/339275" }, { "name": "[oss-security] 20200608 hostapd: UPnP SUBSCRIBE misbehavior in hostapd WPS AP", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/yunuscadirci/CallStranger" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/corelight/callstranger-detector" }, { "name": "FEDORA-2020-df3e1cfde9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "name": "FEDORA-2020-1f7fc0d0c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "name": "FEDORA-2020-e538e3e526", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "name": "[debian-lts-announce] 20200806 [SECURITY] [DLA 2315-1] gupnp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "name": "[debian-lts-announce] 20200808 [SECURITY] [DLA 2318-1] wpa security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "name": "USN-4494-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4494-1/" }, { "name": "DSA-4806", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4806" }, { "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2489-1] minidlna security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "name": "DSA-4898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4898" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12695", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.callstranger.com", "refsource": "MISC", "url": "https://www.callstranger.com" }, { "name": "https://www.kb.cert.org/vuls/id/339275", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/339275" }, { "name": "[oss-security] 20200608 hostapd: UPnP SUBSCRIBE misbehavior in hostapd WPS AP", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/08/2" }, { "name": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of", "refsource": "MISC", "url": "https://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of" }, { "name": "https://github.com/yunuscadirci/CallStranger", "refsource": "MISC", "url": "https://github.com/yunuscadirci/CallStranger" }, { "name": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html" }, { "name": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/", "refsource": "MISC", "url": "https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek/" }, { "name": "https://github.com/corelight/callstranger-detector", "refsource": "MISC", "url": "https://github.com/corelight/callstranger-detector" }, { "name": "FEDORA-2020-df3e1cfde9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZDWHKGN3LMGSUEOAAVAMOD3IUIPJVOJ/" }, { "name": "FEDORA-2020-1f7fc0d0c9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQEYVY4D7LASH6AI4WK3IK2QBFHHF3Q2/" }, { "name": "FEDORA-2020-e538e3e526", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3SHL4LOFGHJ3DIXSUIQELGVBDJ7V7LB/" }, { "name": "[debian-lts-announce] 20200806 [SECURITY] [DLA 2315-1] gupnp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html" }, { "name": "[debian-lts-announce] 20200808 [SECURITY] [DLA 2318-1] wpa security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html" }, { "name": "USN-4494-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4494-1/" }, { "name": "DSA-4806", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4806" }, { "name": "[debian-lts-announce] 20201210 [SECURITY] [DLA 2489-1] minidlna security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html" }, { "name": "DSA-4898", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4898" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12695", "datePublished": "2020-06-08T16:45:04", "dateReserved": "2020-05-07T00:00:00", "dateUpdated": "2024-08-04T12:04:22.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9375
Vulnerability from cvelistv5
Published
2020-03-25 14:17
Modified
2024-08-04 10:26
Severity ?
EPSS score ?
Summary
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:26:16.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-26T16:06:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-9375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html", "refsource": "MISC", "url": "https://thewhiteh4t.github.io/2020/02/27/CVE-2020-9375-TP-Link-Archer-C50-v3-Denial-of-Service.html" }, { "name": "https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware", "refsource": "CONFIRM", "url": "https://www.tp-link.com/in/support/download/archer-c50/v3/#Firmware" }, { "name": "http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156928/TP-Link-Archer-C50-V3-Denial-of-Service.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-9375", "datePublished": "2020-03-25T14:17:59", "dateReserved": "2020-02-24T00:00:00", "dateUpdated": "2024-08-04T10:26:16.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-30383
Vulnerability from cvelistv5
Published
2023-07-18 00:00
Modified
2024-10-28 18:35
Severity ?
EPSS score ?
Summary
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:21:44.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://tplink.com" }, { "tags": [ "x_transferred" ], "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware%29%2CTPLINK" }, { "tags": [ "x_transferred" ], "url": "https://www.tp-link.com/us/support/download/archer-c2/v1/#Firmware" }, { "tags": [ "x_transferred" ], "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/a2ure123/a4eda2813d85d8b414bb87e855ab4bf8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "archer_c50", "vendor": "tp-link", "versions": [ { "status": "affected", "version": "v2_160801" } ] }, { "cpes": [ "cpe:2.3:h:tp-link:archer_c20:1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "archer_c20", "vendor": "tp-link", "versions": [ { "status": "affected", "version": "v1_150707" } ] }, { "cpes": [ "cpe:2.3:h:tp-link:archer_c2:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "archer_c2", "vendor": "tp-link", "versions": [ { "status": "affected", "version": "v1_170228" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-30383", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T18:32:54.899161Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T18:35:54.750Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-18T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://tplink.com" }, { "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware%29%2CTPLINK" }, { "url": "https://www.tp-link.com/us/support/download/archer-c2/v1/#Firmware" }, { "url": "https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware" }, { "url": "https://gist.github.com/a2ure123/a4eda2813d85d8b414bb87e855ab4bf8" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-30383", "datePublished": "2023-07-18T00:00:00", "dateReserved": "2023-04-07T00:00:00", "dateUpdated": "2024-10-28T18:35:54.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33087
Vulnerability from cvelistv5
Published
2022-06-30 22:27
Modified
2024-08-03 08:01
Severity ?
EPSS score ?
Summary
A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50&A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
References
▼ | URL | Tags |
---|---|---|
https://github.com/cilan2/iot/blob/main/4.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:01:19.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/cilan2/iot/blob/main/4.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50\u0026A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-30T22:27:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/cilan2/iot/blob/main/4.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-33087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50\u0026A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/cilan2/iot/blob/main/4.md", "refsource": "MISC", "url": "https://github.com/cilan2/iot/blob/main/4.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-33087", "datePublished": "2022-06-30T22:27:55", "dateReserved": "2022-06-13T00:00:00", "dateUpdated": "2024-08-03T08:01:19.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0936
Vulnerability from cvelistv5
Published
2023-02-21 09:24
Modified
2024-08-02 05:32
Severity ?
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS score ?
Summary
A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.221552 | vdb-entry, technical-description, exploit | |
https://vuldb.com/?ctiid.221552 | signature |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | TP-Link | Archer C50 |
Version: V2_160801 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:32:45.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "exploit", "x_transferred" ], "url": "https://vuldb.com/?id.221552" }, { "tags": [ "signature", "x_transferred" ], "url": "https://vuldb.com/?ctiid.221552" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "modules": [ "Web Management Interface" ], "product": "Archer C50", "vendor": "TP-Link", "versions": [ { "status": "affected", "version": "V2_160801" } ] } ], "credits": [ { "lang": "en", "type": "analyst", "value": "a2ure (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in TP-Link Archer C50 V2_160801 ausgemacht. Dies betrifft einen unbekannten Teil der Komponente Web Management Interface. Dank Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.1, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T21:33:29.352Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "exploit" ], "url": "https://vuldb.com/?id.221552" }, { "tags": [ "signature" ], "url": "https://vuldb.com/?ctiid.221552" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-02-21T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-02-21T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-03-27T22:56:50.000Z", "value": "VulDB entry last update" } ], "title": "TP-Link Archer C50 Web Management Interface denial of service" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2023-0936", "datePublished": "2023-02-21T09:24:29.992Z", "dateReserved": "2023-02-21T09:22:35.190Z", "dateUpdated": "2024-08-02T05:32:45.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }