All the vulnerabilites related to zyxel - nwa1123-ac_pro
cve-2020-25014
Vulnerability from cvelistv5
Published
2020-11-27 17:18
Modified
2024-08-04 15:26
Severity ?
Summary
A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:26:09.045Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://businessforum.zyxel.com/categories/security-news-and-release"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-27T17:18:30",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://businessforum.zyxel.com/categories/security-news-and-release"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-25014",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://businessforum.zyxel.com/categories/security-news-and-release",
              "refsource": "MISC",
              "url": "https://businessforum.zyxel.com/categories/security-news-and-release"
            },
            {
              "name": "https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml",
              "refsource": "CONFIRM",
              "url": "https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-25014",
    "datePublished": "2020-11-27T17:18:30",
    "dateReserved": "2020-08-28T00:00:00",
    "dateUpdated": "2024-08-04T15:26:09.045Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-7261
Vulnerability from cvelistv5
Published
2024-09-03 02:10
Modified
2024-09-05 15:36
Severity ?
Summary
The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.
Impacted products
Vendor Product Version
Zyxel WAC500 firmware Version: <= 6.70(ABVS.4)
Zyxel WAX655E firmware Version: <= 7.00(ACDO.1)
Zyxel WBE530 firmware Version: <= 7.00(ACLE.1)
Zyxel USG LITE 60AX firmware Version: V2.00(ACIP.2)
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:zyxel:usg_lite_60ax_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "usg_lite_60ax_firmware",
            "vendor": "zyxel",
            "versions": [
              {
                "lessThanOrEqual": "V2.00\\(ACIP.2\\)",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:zyxel:nwa1123acv3_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nwa1123acv3_firmware",
            "vendor": "zyxel",
            "versions": [
              {
                "lessThanOrEqual": "6.70\\(ABVT.4\\)",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:zyxel:wac500_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wac500_firmware",
            "vendor": "zyxel",
            "versions": [
              {
                "lessThanOrEqual": "6.70\\(ABVS.4\\)",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:zyxel:wax655e_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wax655e_firmware",
            "vendor": "zyxel",
            "versions": [
              {
                "lessThanOrEqual": "7.00\\(ACDO.1\\)",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:zyxel:wbe530_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wbe530_firmware",
            "vendor": "zyxel",
            "versions": [
              {
                "lessThanOrEqual": "7.00\\(ACLE.1\\)",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-7261",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T03:55:55.275964Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T15:36:14.807Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "NWA1123ACv3 firmware",
          "vendor": "Zyxel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 6.70(ABVT.4)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAC500 firmware",
          "vendor": "Zyxel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 6.70(ABVS.4)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAX655E firmware",
          "vendor": "Zyxel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 7.00(ACDO.1)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WBE530 firmware",
          "vendor": "Zyxel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 7.00(ACLE.1)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "USG LITE 60AX firmware",
          "vendor": "Zyxel",
          "versions": [
            {
              "status": "affected",
              "version": "V2.00(ACIP.2)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The improper neutralization of special elements in the parameter \"host\" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eand earlier\u003c/span\u003e, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eand earlier\u003c/span\u003e, and\u0026nbsp;USG LITE 60AX firmware version\u0026nbsp;V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device."
            }
          ],
          "value": "The improper neutralization of special elements in the parameter \"host\" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) \n\nand earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) \n\nand earlier, and\u00a0USG LITE 60AX firmware version\u00a0V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-03T02:10:25.112Z",
        "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f",
        "shortName": "Zyxel"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f",
    "assignerShortName": "Zyxel",
    "cveId": "CVE-2024-7261",
    "datePublished": "2024-09-03T02:10:25.112Z",
    "dateReserved": "2024-07-30T02:42:19.589Z",
    "dateUpdated": "2024-09-05T15:36:14.807Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2024-09-03 03:15
Modified
2024-09-13 19:39
Severity ?
Summary
The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa110ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4516EB83-8B99-40BD-94E5-CBD5057107B8",
              "versionEndExcluding": "7.00\\(abtg.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa110ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3F9232-F988-4428-9898-4F536123CE88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa1123-ac_pro_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9875CD66-9249-4702-88E5-B1239FA4AD29",
              "versionEndExcluding": "6.28\\(abhd.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa1123-ac_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "145723DB-C34B-4C2A-B3C2-7A5CFEF503CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa1123acv3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C88D274-D770-46F9-A802-93B1C72C3802",
              "versionEndExcluding": "6.70\\(abvt.5\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa1123acv3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C13E7F-2186-4587-83E9-57B05A7147B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa130be_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1105DC-E628-45C7-BB10-6EFB8038FC46",
              "versionEndExcluding": "7.00\\(acil.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa130be:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "782F9AB7-3464-4BFE-B502-B62CD51A8865",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa210ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F03710-B004-4AA1-BBE3-FD6AD2ABF681",
              "versionEndExcluding": "7.00\\(abtd.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa210ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB129F9-64D8-43C2-9366-51EBDF419F5F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa220ax-6e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD8274A-8135-4C3F-9998-4F13170DC5BD",
              "versionEndExcluding": "7.00\\(acco.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa220ax-6e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03F755-424D-4248-9076-ED7BECEB94C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa50ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "439ED873-6DBF-4B67-B7B6-B285D885093C",
              "versionEndExcluding": "7.00\\(abyw.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa50ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2806A3B3-8F13-4170-B284-8809E3502044",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa50ax_pro_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76456787-1EB9-4585-A2D3-CAD77786B3EF",
              "versionEndExcluding": "7.00\\(acge.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa50ax_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F36E7DCD-08BA-4FA1-9A8E-ADE956704132",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa55axe_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "319234D0-CBED-43AD-B21C-E3893786FA00",
              "versionEndExcluding": "7.00\\(abzl.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa55axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7440976-5CB4-40BE-95C2-98EF4B888109",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa90ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA77A46-A9BF-46A7-BCC3-0851FD2EDB4B",
              "versionEndExcluding": "7.00\\(accv.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa90ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A903978-737E-4266-A670-BC94E32CAF96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:nwa90ax_pro_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C991363D-0CD5-4242-9B6D-903B6C71F3F3",
              "versionEndExcluding": "7.00\\(acgf.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa90ax_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "480A495A-A4C4-4696-B500-B6333C79A28B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:usg_lite_60ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC39E0F3-D1D4-41BE-ABF1-F01A7AC1F959",
              "versionEndExcluding": "v2.00\\(acip.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_lite_60ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC710993-3E55-4C88-A261-0A67F5069071",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E3E89C7-C3DA-4B4E-A8F1-EF854EB61C0C",
              "versionEndExcluding": "6.70\\(abvs.5\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C024551-F08F-4152-940D-1CF8BCD79613",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac500h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A27C2E-140D-4554-8AD1-D9EBB76CF9D5",
              "versionEndExcluding": "6.70\\(abwa.5\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FD502-4F62-4C77-B3BC-E563B24F0067",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac6103d-i_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0867C187-0BF0-4F4E-B291-3858810724D6",
              "versionEndExcluding": "6.28\\(aaxh.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6103d-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "341DB051-7F01-4B36-BA15-EBC25FACB439",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac6502d-s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBA0866-22E5-4CE6-886C-CE21E6A4E6B0",
              "versionEndExcluding": "6.28\\(aase.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6502d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD108388-ABE5-4142-910F-C3C8B1C13617",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac6503d-s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45449005-459C-4062-97FB-31B7CB249E21",
              "versionEndExcluding": "6.28\\(aasf.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6503d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DFDF64A-17F5-4F05-8700-DCA36CCB6F2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac6552d-s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C083097-E839-49ED-B4A8-8AEF5C502E47",
              "versionEndExcluding": "6.28\\(abio.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6552d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD47738A-9001-4CC1-8FED-1D1CFC56F548",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wac6553d-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04666D56-1996-461E-B8AB-C5BCA6399EE8",
              "versionEndExcluding": "6.28\\(aasg.3\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6553d-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55273BCE-4F2C-4ED9-9FCB-D1197555BD53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax300h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBEEF0EC-A325-4D02-B69E-AE24A4669C57",
              "versionEndExcluding": "7.00\\(achf.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3073565-BCDF-46EA-8FB0-E9BF402A5122",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax510d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6295B167-56B0-4F68-8163-0ECCA7ED5E0C",
              "versionEndExcluding": "7.00\\(abtf.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax510d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A37A0E9-D505-4376-AB0E-1C0FD7E53A55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax610d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "924067FC-8230-440A-B596-05F3A39C3456",
              "versionEndExcluding": "7.00\\(abte.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax610d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3518DA0A-2C7B-4979-A457-0826C921B0F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax620d-6e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A073C2-4124-49F1-BCBF-1508A310DCA0",
              "versionEndExcluding": "7.00\\(accn.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax620d-6e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B4EBCC9-4FF9-41FC-9FFE-DBFAB239888B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax630s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC244157-2D23-4DC2-A809-869948AC2096",
              "versionEndExcluding": "7.00\\(abzd.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax630s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC74AAF9-5206-4CEB-9023-6CD4F38AA623",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax640s-6e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10075392-47BE-4B55-BEEF-6D259C6AFDF5",
              "versionEndExcluding": "7.00\\(accm.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax640s-6e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E4E9A0-DF92-47B7-94D6-0867E3171E47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax650s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794E19F4-ED5D-403C-BFA7-7D089FACC45F",
              "versionEndExcluding": "7.00\\(abrm.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax650s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D784994E-E2CE-4328-B490-D9DC195A53DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wax655e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E1F72E5-0336-4565-802F-75A746DD4AA9",
              "versionEndExcluding": "7.00\\(acdo.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax655e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61158220-B5E8-4BF4-B2C2-E8ABFD3266CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wbe530_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C302D991-2BAB-4C64-B0E0-EAEE19F79765",
              "versionEndExcluding": "7.00\\(acle.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wbe530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3061579E-C708-42BC-86FC-B6223B941335",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:wbe660s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52534374-242E-457F-A794-8A1AEFECA38F",
              "versionEndExcluding": "7.00\\(acgg.2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wbe660s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC2F3A4-0598-49B0-9829-AF43C97E9E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The improper neutralization of special elements in the parameter \"host\" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) \n\nand earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) \n\nand earlier, and\u00a0USG LITE 60AX firmware version\u00a0V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device."
    },
    {
      "lang": "es",
      "value": "La neutralizaci\u00f3n incorrecta de elementos especiales en el par\u00e1metro \"host\" en el programa CGI de la versi\u00f3n de firmware 6.70(ABVT.4) y anteriores de Zyxel NWA1123ACv3, la versi\u00f3n de firmware 6.70(ABVS.4) y anteriores de WAC500, la versi\u00f3n de firmware 7.00(ACDO.1) y anteriores de WAX655E, la versi\u00f3n de firmware 7.00(ACLE.1) y anteriores de WBE530, y la versi\u00f3n de firmware V2.00(ACIP.2) de USG LITE 60AX podr\u00eda permitir que un atacante no autenticado ejecute comandos del sistema operativo enviando una cookie manipulada a un dispositivo vulnerable."
    }
  ],
  "id": "CVE-2024-7261",
  "lastModified": "2024-09-13T19:39:40.570",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "security@zyxel.com.tw",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-09-03T03:15:03.940",
  "references": [
    {
      "source": "security@zyxel.com.tw",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024"
    }
  ],
  "sourceIdentifier": "security@zyxel.com.tw",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "security@zyxel.com.tw",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-27 18:15
Modified
2024-12-12 16:23
Severity ?
Summary
A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet.
Impacted products
Vendor Product Version
zyxel zld *
zyxel zywall_110 -
zyxel zld *
zyxel zywall_1100 -
zyxel zld *
zyxel zywall_310 -
zyxel zld *
zyxel usg_110 -
zyxel zld *
zyxel usg_1100 -
zyxel zld *
zyxel usg_1900 -
zyxel zld *
zyxel usg_20w -
zyxel zld *
zyxel usg_20w-vpn -
zyxel zld *
zyxel usg_2200-vpn -
zyxel zld *
zyxel usg_310 -
zyxel zld *
zyxel usg_40 -
zyxel zld *
zyxel usg_40w -
zyxel zld *
zyxel usg_60 -
zyxel zld *
zyxel usg_60w -
zyxel zld *
zyxel usg110 -
zyxel zld *
zyxel usg1100 -
zyxel zld *
zyxel usg1900 -
zyxel zld *
zyxel usg20-vpn -
zyxel zld *
zyxel usg20w-vpn -
zyxel zld *
zyxel usg210 -
zyxel zld *
zyxel usg2200-vpn -
zyxel zld *
zyxel usg310 -
zyxel zld *
zyxel usg40 -
zyxel zld *
zyxel usg40w -
zyxel zld *
zyxel usg60 -
zyxel zld *
zyxel usg60w -
zyxel zld *
zyxel vpn100 -
zyxel zld *
zyxel vpn300 -
zyxel zld *
zyxel vpn50 -
zyxel zld *
zyxel usg_flex_100 -
zyxel zld *
zyxel usg_flex_200 -
zyxel zld *
zyxel usg_flex_500 -
zyxel zld *
zyxel usg_flex_100w -
zyxel zld *
zyxel usg_flex_700 -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa1123-ac_hd -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa1123-ac_pro -
zyxel access_points_firmware *
zyxel access_points_firmware -
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa1123-acv2 -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wax510d -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wac5302d-s -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa5120 -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa5301-nj -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wax610d -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wax650s -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wac6550 -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wac6303d-s -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wac6500 -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel wac6100 -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa210ax -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa110ax -
zyxel access_points_firmware *
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel access_points_firmware 6.10
zyxel nwa1302-ac -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "145E41D9-E376-4B8E-A34F-F2C7ECFD649D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCE32A1C-A730-4893-BCB9-F753F8E65440",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40C703E-C7C0-4B49-A336-83853D3E8C31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7E32879-01A2-49B1-A354-068CEB1CA3A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4B9AC6-7C55-42BD-A1D8-F5D5A19AC59D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CE6F04-403B-4A52-A3A5-DD0190CF15D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_20w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD5A4AB-0CC2-4CAF-AAFA-0F866174842F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEA412F-3DA1-4E91-9C74-0666147DABCE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_2200-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32F7F370-C585-45FE-A7F7-40BFF13928CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B7995C-80E0-413B-9F2C-387EF3703927",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84DDB81-DE66-4427-8833-633B45A45A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_40w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F11F36C-60DB-4D81-A320-53EEE43758C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65DB5E9-2FE3-4807-970E-A42FDF82B50E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_60w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82864EF6-B63D-4947-A18C-AE0156CCA7FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4834AC5E-884D-4A1C-A39B-B3F4A281E3CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B68C4BD-3279-47AB-AC2A-7555163B12E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F4E816-C4D3-451A-965C-45387D7DEB5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7239C54F-EC9E-44B4-AE33-1D36E5448219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D2AD3A-9197-487D-A267-24DE332CC66B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFF1122-755A-4531-AA2E-FD6E8478F92F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg2200-vpn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CB2401-479A-4124-B03F-589D7C1061FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F302801D-3720-4598-8458-A8938BD6CB46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CCD2777-CC85-4BAA-B16B-19C2DB8DB742",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg40w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0906F3FA-793B-421D-B957-7E9C18C1AEC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26900300-1325-4C8A-BC3B-A10233B2462A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg60w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A7555E-BC29-460C-A701-7DCDEAFE67F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D90A7B-174F-40A1-8AF4-08B15B7BAC40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C45C303-1A95-4245-B242-3AB9B9106CD4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3AC823-0ECA-42D8-8312-2FBE5914E4C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B30A4C0-9928-46AD-9210-C25656FB43FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F93B6A06-2951-46D2-A7E1-103D7318D612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C697A5-D1D3-4FF0-9C43-D27B18181958",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74ABA7E-AA78-4A13-A64E-C44021591B42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C40B7360-E9B0-4198-8163-CEADE7525E66",
              "versionEndIncluding": "4.55",
              "versionStartIncluding": "4.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D1396E3-731B-4D05-A3F8-F3ABB80D5C29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa1123-ac_hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A0FB576-76A2-4A25-979E-5E5B3BF5C636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa1123-ac_pro:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "145723DB-C34B-4C2A-B3C2-7A5CFEF503CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEC41216-BA1D-4D89-BA08-4A3EDC9EA6B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa1123-acv2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49C40B96-55B2-44AA-A75A-92EEEE93371C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax510d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A37A0E9-D505-4376-AB0E-1C0FD7E53A55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac5302d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AA4FC1-E3E4-499F-B0C1-22B738DA4DA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa5120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "109301CB-1A6F-4FF2-A64E-55D698A601CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa5301-nj:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328EB14D-84E9-4F4B-8277-43F52644AE7B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax610d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3518DA0A-2C7B-4979-A457-0826C921B0F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wax650s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D784994E-E2CE-4328-B490-D9DC195A53DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22BA1F7B-B2D2-44D6-83A4-859DF7BAC001",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6303d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F08117-0BCE-4EA1-8DA7-1AC4EFF67E2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B504AA70-D60A-4158-B3A5-BADBED2F8BAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:wac6100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "227EDB1C-0070-4B5D-9070-B4717DB3DF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa210ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB129F9-64D8-43C2-9366-51EBDF419F5F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa110ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3F9232-F988-4428-9898-4F536123CE88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAC4D19-A1FA-4539-A672-46207670D9DF",
              "versionEndIncluding": "6.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "23C1F0FA-38F5-4EA0-AEE0-219C34DCCE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "A3B4EC91-B091-474F-B2E9-4DF474746547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch2:*:*:*:*:*:*",
              "matchCriteriaId": "D3831184-A454-4E0D-9B1D-653C5FF7A6F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch3:*:*:*:*:*:*",
              "matchCriteriaId": "CC14EDB3-613B-4531-9581-1A9687E27ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch4:*:*:*:*:*:*",
              "matchCriteriaId": "C5B8CBD3-5115-4813-A372-66C0312DA95E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "725083DF-B9BE-45DD-B999-511528F2C4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch6:*:*:*:*:*:*",
              "matchCriteriaId": "0B9218D6-0DBF-45A8-ABED-AAC6C800B88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:zyxel:access_points_firmware:6.10:patch7:*:*:*:*:*:*",
              "matchCriteriaId": "5D785597-7B27-4910-A4A0-0E2968CA7488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:zyxel:nwa1302-ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA514BB-B688-4EBD-9530-F5112F7503F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el archivo fbwifi_continue.cgi en Zyxel serie UTM y VPN de puertas de enlace que ejecutan la versi\u00f3n de firmware V4.30 hasta la V4.55, lo que permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario por medio de un paquete http dise\u00f1ado"
    }
  ],
  "id": "CVE-2020-25014",
  "lastModified": "2024-12-12T16:23:25.593",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-27T18:15:11.563",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://businessforum.zyxel.com/categories/security-news-and-release"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://businessforum.zyxel.com/categories/security-news-and-release"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}