Search criteria
15 vulnerabilities found for seil\/x1_firmware by iij
FKIE_CVE-2015-0887
Vulnerability from fkie_nvd - Published: 2015-02-28 02:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.70:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8D02A6-04AB-417A-AE23-89C4D63C4B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BF46F8-354B-473B-AE3A-0FFEE3A0E981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "269BC5F1-4EBC-48C2-A4D5-3C50FAA4CE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.73:*:*:*:*:*:*:*",
"matchCriteriaId": "19814D90-B255-4D94-9F77-7B89511F95F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.74:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBD3485-274B-4C45-913C-B130E98B90FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.75:*:*:*:*:*:*:*",
"matchCriteriaId": "87A64A33-C9C1-4E0E-B884-97F8F8970121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD43D90-A23A-41D3-9B0C-97AFE54964D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.77:*:*:*:*:*:*:*",
"matchCriteriaId": "22A1E090-CAF4-4921-80CE-C0EAF6D2844C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.78:*:*:*:*:*:*:*",
"matchCriteriaId": "2C27BCA0-B5F4-4DBE-8B59-FA64D16EC862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.79:*:*:*:*:*:*:*",
"matchCriteriaId": "EF02258E-EA0E-450E-B848-81A97CF25E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "7F2C0D20-CE04-43E9-98FA-AF670CEB6E97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "362BB56C-AF2D-4CB1-8E58-A97B1CE8EF59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "79F31568-6854-41D0-9259-2738879842CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "3E37B6EC-C283-4A92-981D-317E2D3CA692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "370F89E6-CD53-4AE0-B393-70C036F0EBA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6E5B61-BC6D-469C-AEAD-F6694410E1FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.86:*:*:*:*:*:*:*",
"matchCriteriaId": "03978110-0AF3-4F74-A9F0-CA3AA34A3C06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.87:*:*:*:*:*:*:*",
"matchCriteriaId": "11671A3A-1586-4B84-9DEF-7E3CBF9ADDD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.88:*:*:*:*:*:*:*",
"matchCriteriaId": "44758BCB-95C9-488D-856D-38D89F9670A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.89:*:*:*:*:*:*:*",
"matchCriteriaId": "5E15207D-7A07-4D72-BE98-39674ECA2AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C8F918D3-427A-41A2-84FE-60E4320A767E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "325D16D9-8A39-4086-8BAA-2A808E00225C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "83DA4AE8-CEB1-4992-ABC2-DABACFA27955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "F46FD868-B35C-453E-A2E2-722046CAE7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAD9397-FACC-4B18-B016-34883D3B4791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "72E91627-EB59-4925-9261-1DEB2F9BB7A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "6B32738E-D269-45A9-9180-648BD6FADA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.97:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E3B306-65E1-45E5-934E-B4AA34D5BBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD90BA1-9EBA-49AD-B461-899E72691B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F9568D-EDF8-48B4-B874-94D414C87A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "2C0283C2-870E-43DA-8BEB-D28651004AB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "BE592911-1CE9-443C-BD18-2B564023606C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F2AB73-608A-4B56-9D43-AD61CE4A94C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "859C1AC7-869D-4B2E-AAB6-E69207AF7126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "47FC271F-4143-4728-9E2D-CFC85F88D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4077D3DD-08D9-4863-95DC-221ABA7AE9B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "02F0A398-2C39-41CF-90E2-B7EE4870C88B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "17C008AA-E970-4351-ACE8-39524E690074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "8824B46D-CA99-4CF7-BD22-B60522F37850",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "E208D11C-99CD-4E28-906D-B7ED9EF13E06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "561B1C88-3466-43A2-9809-588235CD2DA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5F0ED3-C018-424B-B2DA-229569658C30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E64DAB1B-082F-4B52-BAE7-62B688E6E12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5744FD65-AFAD-420E-82FA-8DFBFD08D643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D4403C-CA30-43AA-B526-ECD26286A833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "13515FF8-3CEE-433C-9A67-36F7CE96A6AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5203877D-6A8E-4DEC-BB45-65867FD4E0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEDA8DB-F84F-4128-90D7-A20ED2C27A53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "AEA46302-6A30-4A2E-B8EB-3FC236A81E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "151F2C9F-C43B-4D5A-9638-46B8E9AC0EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "646464DE-3E75-474C-B786-B583A4B14CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "58FF130E-CA60-4042-A92F-69086F5B6A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE34539-2BF7-47E4-84E0-738449D2521E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C751E0-A895-4187-A101-2F6522D83A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "699B8612-571C-4C39-9396-9CB846C68A51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAA392E-14BF-4D7C-93F4-5779C62BFF1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5A76FE-E713-4297-BD27-46106B56A4F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "6F00B579-4CBA-492C-9042-F93B92E28F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "53053828-CDA4-4D38-9AA8-CCF33B882258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "26BACB9F-7E92-44E5-933C-B7E6B0B20C54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "32D0D052-73FB-4F8F-8955-E96F61F6DEEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A9CDFE-6A62-4BDF-AF0A-4760E725397A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "46104522-F559-412F-B661-18C2CA26A43C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A5BB50D9-213A-482F-AF9F-55444D60D8BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFB7057-6C06-4E83-A3C6-FF0FD43C07D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.35:*:*:*:*:*:*:*",
"matchCriteriaId": "324D3B81-DD74-42A4-B91A-9C5680DE54E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.36:*:*:*:*:*:*:*",
"matchCriteriaId": "2527E432-2154-4D37-BE72-41B337B46691",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F278D549-ED29-4B66-80D0-B76C39D8E329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.38:*:*:*:*:*:*:*",
"matchCriteriaId": "F032D842-DB0A-49C1-937B-7465A5BBB2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.39:*:*:*:*:*:*:*",
"matchCriteriaId": "ABFB46EE-8A83-4D0D-A1C3-7124735809F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9796E1-7B40-49E1-AFF8-5ED9794DAC0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6EB09E-ED74-47FE-A6FE-53C26DD38A73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0068DF-4884-4579-B48C-D1A927531116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "355C0B14-788F-40F4-BC5C-201DFCE8F956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "D91A205E-4300-48C5-8377-12C6FEC22EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.45:*:*:*:*:*:*:*",
"matchCriteriaId": "EF147C19-9174-408A-84ED-7E00A236E0D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.46:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AD23EF-6FAD-43FA-9EFA-E37392542712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.47:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD0DDF3-B88B-427A-B45D-C810C5F1071E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.48:*:*:*:*:*:*:*",
"matchCriteriaId": "3CDE25A0-3200-4559-9E17-9ECF866D4AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.49:*:*:*:*:*:*:*",
"matchCriteriaId": "87E99D67-3615-44AE-8939-16B8BA23359F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "00B31EB1-7813-449D-B111-DE9FFFD04583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4C335733-E5EC-48B7-B546-793C915929B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D4DA4C-9503-4BD1-A5A1-A33A1012BF0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.53:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD4336F-5F90-4C98-ACC5-B217E762C1C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.54:*:*:*:*:*:*:*",
"matchCriteriaId": "95980354-068B-46A2-8D85-A4309E7F19EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.55:*:*:*:*:*:*:*",
"matchCriteriaId": "8BE8CE7E-3432-413F-9517-CD1D5C9AF1DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.56:*:*:*:*:*:*:*",
"matchCriteriaId": "C83D3A6A-A8BB-493C-8131-BF0DCC092950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.57:*:*:*:*:*:*:*",
"matchCriteriaId": "7CABEC61-A16E-4814-9722-CEA4E1147C47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D65F1DB4-D3CF-4BD5-B7EB-9AD6C9B23B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.59:*:*:*:*:*:*:*",
"matchCriteriaId": "DC5E8836-AEE3-4259-9D23-807C5DD3F60C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "64FCFC9D-5582-4AF8-B4BD-FA1FDCC80E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0FEE7B-F339-4F45-8A04-06B8CC5DA558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E4B2EB-05D0-4E9C-B32B-99B3B64A52A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "0F608B7A-ED00-42EE-BA17-B7E7F3BC9952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.64:*:*:*:*:*:*:*",
"matchCriteriaId": "305AA4E9-FAF3-4912-931C-1C1F818F46DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.65:*:*:*:*:*:*:*",
"matchCriteriaId": "273D931E-D841-4D1F-943B-CFFECF2EC8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.66:*:*:*:*:*:*:*",
"matchCriteriaId": "C55B16E6-4291-45B6-9B7D-E3BCAE6B8085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.67:*:*:*:*:*:*:*",
"matchCriteriaId": "75CD14A4-6147-4954-91DE-3B2536C3CCC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.68:*:*:*:*:*:*:*",
"matchCriteriaId": "A79800C2-FF93-4633-A8DD-21CDDAF54A6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.69:*:*:*:*:*:*:*",
"matchCriteriaId": "9E80BCC2-9E94-4D5C-AE8C-B54277FAB212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "31CA2624-7784-4D22-B2C9-79A00B733D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.71:*:*:*:*:*:*:*",
"matchCriteriaId": "5851431D-8C15-49C1-AB3B-34A6F701E685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "08342E46-2B44-49E6-87F3-EF90B1A2B148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "8CC52E69-7AF0-4E6C-9BC9-50298AB1C376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "8CC0C55C-E479-4881-862A-1A6A37F17583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "056BC669-3BD5-4BE0-A596-09154171C431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.76:*:*:*:*:*:*:*",
"matchCriteriaId": "18C6BFA0-FE33-445F-B2D1-A8CE6033512B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.77:*:*:*:*:*:*:*",
"matchCriteriaId": "7723BC29-8EB2-48C5-8FDD-E4DAEBA075D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.78:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3A227D-B259-428F-8641-8C18755B4721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.79:*:*:*:*:*:*:*",
"matchCriteriaId": "10451901-0776-4E3B-8A6F-EE97C4383B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "A5C03F1C-C2E7-46DA-8F1B-37BC1CC351BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "52890CD6-65E5-446D-B02B-80CAE0F6DF30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.82:*:*:*:*:*:*:*",
"matchCriteriaId": "4337DA2E-7CC3-40E3-B1A5-149ED94F8DBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.83:*:*:*:*:*:*:*",
"matchCriteriaId": "F69ED488-26B5-4B5A-BCB1-C1CFCB39DAD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.84:*:*:*:*:*:*:*",
"matchCriteriaId": "65A3B3E6-863F-44A8-B891-F3F6B807BC48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.85:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3C8305-39F5-4CD9-A1A0-65A554B6D54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.86:*:*:*:*:*:*:*",
"matchCriteriaId": "523F060A-4EEB-44FF-BBE0-94348CA55E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.87:*:*:*:*:*:*:*",
"matchCriteriaId": "5566242D-E1A0-4E1C-80D4-EBE55B7E0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.88:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5B8E8D-DAFD-474D-8B67-04687D245D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.89:*:*:*:*:*:*:*",
"matchCriteriaId": "3D01CAD8-0A6A-4FA3-9E4E-A312B02BB8E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.90:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C4B62-490A-48D1-B536-E03B7E7C2503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.91:*:*:*:*:*:*:*",
"matchCriteriaId": "9E125585-F64E-4DCB-A32F-DCA82D3187C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.92:*:*:*:*:*:*:*",
"matchCriteriaId": "88D62430-4FF1-4E84-8A0B-37A09CEC0624",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.93:*:*:*:*:*:*:*",
"matchCriteriaId": "885DD3DE-1D6F-4914-B693-04C373A3462E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.94:*:*:*:*:*:*:*",
"matchCriteriaId": "B061E31C-62B5-4691-942A-49848147A8CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.95:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF3D647-AF54-4340-A949-0ADD90FAA22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.96:*:*:*:*:*:*:*",
"matchCriteriaId": "506B1D0D-70FF-42ED-A5F5-41D6060CE292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.97:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFAC855-A033-4AC8-9AB5-C209BA612545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.98:*:*:*:*:*:*:*",
"matchCriteriaId": "04836653-9675-422F-80F2-EFCDA401835D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDBE39C-1DA9-48A1-88A1-578082D7A863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "4F0DAFA0-104F-4BE1-98F7-E1BEFB197637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB5B6C9-6A7F-4420-9978-078E14FEEB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D6450326-BA53-431A-A64C-93325D443E08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.03:*:*:*:*:*:*:*",
"matchCriteriaId": "BC43ACB2-6162-44EB-8D95-8A45E9B717F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "517F2DC3-9847-4DC3-B78A-5D6683E0C2E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.05:*:*:*:*:*:*:*",
"matchCriteriaId": "2E382C74-0D53-4162-B0E2-5863BF27366E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.06:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A8862A-EE48-46AE-8690-DDDFE229FE1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.07:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAC7176-C157-4EB6-9A58-E5F8D404DAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "30C00243-39CB-491E-AA93-50A407EA830C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.09:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB92797-728A-466D-B8EA-58AFD9023A9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE16D85-7284-4676-9A33-3026E8EACF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0C09B843-CBE5-44C9-A69D-28C2DF6FBDB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "36805791-7BC6-4BFB-A965-E5808CCA54CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC3AD56-E7E4-44B6-986E-189B98CFD430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5F3C3E-7C3F-4D01-AB44-09574E56B61D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9D23F45F-D529-458D-B938-0637291A64FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B80C4633-355F-4AC4-91C6-CB2E0F9B7226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "86AC9A44-CD20-4B33-8141-1C63E55E7993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DE96148E-4987-46B1-9823-229CF0FEB0D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E7069524-E92E-4FA5-98D6-DC9DEEA84274",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBF10BD-4B3F-49A1-82C0-57C3470CE54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A33B0AE6-E6E4-4719-A85C-92261125BE32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "46BB5E6D-38CE-467E-96BB-D0665E878BA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB961AA2-6D5C-4979-AE8A-80D6D2D48071",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4530D901-657F-4140-8691-996069C1472E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "8D40EFE4-3A05-483D-8303-FDD970CAFC99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE1187B-1DBC-4CDF-8B0A-63F740DAF273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "312EA312-639F-4F5A-A8E8-9E93781D3FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "6E764062-0744-49CF-B39A-C44EFDBC7A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "3193326D-43D1-45A8-99FB-4277238FCFF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "CF25B1E4-794B-4424-B9E8-456D64A8EB6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "72C6F9BB-9408-4E76-A00B-8005BE34160E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E7E9F-0387-4CFD-95AF-E6F0E321CBA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3D58697C-D7AA-416A-BA24-3445AFA7B10E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "62EFBF8B-7280-42D6-860B-B5AA71C8317B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C427E6AA-6402-469F-AB34-C28EFAF60855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3967A8-52EE-4D8A-9CA0-C50764A511A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "DF264F0D-5872-4C67-AB95-91BF49722FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDD8733-F19C-41EF-A4B3-95481751CA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1CE5D7-15F5-4A96-A83C-52DBDEFFC836",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "9A02B3D3-738A-49C6-A53C-F8EEE0D4273D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "CFCC51F8-0E31-4DC5-B222-0ED85DE9AC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "40C7E64F-D5BF-4B16-8F0E-5E5BC8BFBA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "C24B71AD-5AA7-4B46-AFC8-930B91619E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3DE86D-F2BD-4023-BA6C-4DE4CEC737EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2C0948-D4C4-4228-BE25-C30E05830E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "E8CE1949-B85A-4E5E-AB07-F0C90C305E0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "D4322627-3FDF-4F59-93A0-AE01F9B5A5DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "56273939-20AF-4815-B167-BCCF911D4E65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "02EF6BA5-B2F7-41E8-ABFA-92E260844589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "60DFFE27-FF5F-4A9F-9B11-D1242378E7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C03E2424-7D18-42D3-A73F-CE9A0A543BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB1601D-4E05-4EC1-BAE5-B9AAD637A610",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED699D8-2755-4903-AD86-3AE9D46BA803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "2721EAF7-775F-48F1-945C-30107B753577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "62DEAC03-96C1-4C4C-A6D9-F529FD6D019B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "C412E3CF-1A4A-43A0-99AA-52C08307BEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB155A9-FD12-428B-9AC1-E1E1DDB56186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "5F38E8D8-6961-4F9E-BA06-61CD6BA1998E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FE715A-9F1A-460B-899D-30ABCB197C71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D35156-18E1-4388-A958-67E0439462D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "24C7AD43-A60D-488B-AC08-D86A61E1DCAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "543D71E0-39E8-4A55-94D3-49CE871ABCB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "673633DB-AF25-40C4-9BC9-99292937C240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBF77AD-5E99-4AA1-BD2C-87B0EDA33F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2F140B-3DF2-4CC6-9978-B6B7942F631A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "96357ECB-C793-4F15-BE12-32A789D0C467",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9B4181-7600-4FD8-91FF-907C7660D47C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "0443F793-8982-4338-BC63-75AA6A3EF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "77648FEF-8672-4C68-95FB-BF1CC18F2682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "91E31FF2-8899-4515-9A59-63048C2F2A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "ED6C3744-51E6-4709-A144-14ECADB68BB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
},
{
"lang": "es",
"value": "npppd en PPP Access Concentrator (PPPAC) en los routers SEIL SEIL/x86 Fuji 1.00 hasta 3.30, los routers SEIL/X1 3.50 hasta 4.70, los routers SEIL/X2 3.50 hasta 4.70, y los routers SEIL/B1 3.50 hasta 4.70 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y cuelgue del dispositivo) a trav\u00e9s de un paquete SSTP manipulado."
}
],
"id": "CVE-2015-0887",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-02-28T02:59:37.923",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01541.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0454
Vulnerability from fkie_nvd - Published: 2011-03-01 23:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "43F0BE07-FC42-4AB1-A553-1B254CC57D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1DADC38F-D530-49FC-A834-3BBC5FF71C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F76EDD89-9C58-40BE-B7AE-72E82D051641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "71B53A2B-FF57-42B1-957B-E01CC8DE087B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0D8323-9921-415C-B47C-49A947068F68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "EEBE6E5A-691F-46EF-B999-18ED949BF2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "11181F82-4A35-43AD-838E-E07092DF8652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9E04C4-EA46-4F14-A60B-12CAD9E98485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "1108097E-7B13-41A8-A6FC-0F958BFEB94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB61B92-399A-45AD-A2EB-886F01DE57D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0928B5-60AB-4F2B-BF12-EEFF0CC38CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "30C0244F-E26B-45E6-A14F-0482B22C4E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4FF3BD-1659-4582-AF3E-385829001579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F107CD-7985-4529-B9CB-F15C9EE80975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5C947580-1489-4B27-A740-1A5853170E89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "6C2D29BB-DAEC-4D24-AA79-E7F136D37B0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0B23BF51-78E0-46B7-8288-16EB6C1D210C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "953C86E4-3E0F-4A75-BD27-EF8BE4F48894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D7717A-A3E4-45A8-A774-3C2855267FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A7500641-D607-4221-ADA2-CBCC338F22A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "21A290E5-32F5-42AE-BDE8-C92B84A44D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC7F97-3208-43EE-B931-A28CD9A3515F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3C03EE30-DC89-4926-A1FF-F878B4F9E205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "90546F95-8BA1-4F13-86F4-91F797528281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A47FE3-A7E3-41FF-81B2-A41CCB776924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "8B75E486-B21A-4155-A4F8-155CD3A2EB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "35A5F2AA-23C4-43D4-B355-A9971503E3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA78DB-5273-48F5-9350-EABAEE8FD79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "E805B146-572E-466E-BF0B-6B53970A72EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "86AAEE2F-8D63-4167-A6C8-DAD2F235015D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "C83696CE-91F3-4559-B16A-D1CF1C915515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF4C61B-393E-44E4-9404-BC331C8E8729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4E913E-1E8D-439B-8B77-35A54E42EC98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "C75C2643-7F2A-4C34-94A0-DCB60399EF07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8E0B95-CFD0-4501-B98E-FC05113F7022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "9F916DA4-79A9-4523-907C-812E3FDF69FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9E82EF-2A12-4A7F-8559-D8D2147FB74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "ADEE64C1-72A3-42FF-A13F-7F3E5F41F53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC574B6-B448-4A51-B5A0-2F521205D4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "71A0080D-3532-46E2-AC7D-F3E3E73622D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "59204C16-8DC1-4BA0-9F73-560CC6D0E37B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A420F017-83DC-4029-A0F8-F50ED600CEA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2923D4A5-FD10-4846-B2F5-93C64DEB081E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07EB84-D033-423B-AD53-D7B47DC508C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CB31A5D1-6219-4E7D-965A-65C885C71C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4383E0DF-E0D2-4E59-8053-CFD57F4C11C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "25B9C033-965D-420F-8F71-C650592D5AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCB5982-5ECF-471C-8731-59AB4784055F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF907907-1E85-4F85-84ED-0DB73466186F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "429DBDFD-C32D-4888-BC36-FCE5896FC963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "809E64CE-504D-49BB-8C76-09D95F814893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC22870-8A4A-483E-AA38-325E1564E4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "07952D84-10F6-46D0-B896-89401F063888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB8C1C6-D47D-4A85-8997-9E356688DA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "07AB01A2-0CC3-49E6-B1A1-FF1BD918019E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "38FA01CD-625E-4DE4-8898-725AF4D8D2B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "88B39BDF-A579-4C67-98E8-C017F426076C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "6285D504-1960-42B4-8F7B-1AEDEB9AE865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F9FFA1-A224-473B-9827-7F5F40A20837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F86FC7-A7B2-4A58-9CDA-3056CE4C9AD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "35160F7C-5804-4A43-96F8-31456EED7DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "486D5372-371D-4E43-B2AA-2E7236C8BDB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "73301872-EFC2-4E08-B166-ECBBEC6DB310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C2C21D-8DEA-4BD4-B116-875DAF8F9AB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "CB84E030-ADCF-4A17-878C-BE6FD000DA18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "D157BDC2-5ABA-4B94-B497-7814656FB4DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "A57A7B71-F867-4229-96C5-F92DA246965D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8B532D-A45C-4111-A251-2BD9130DA95A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "F235CD04-35C6-4682-A106-843CF8E46110",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A112F5-13F8-462E-87CF-AB2CC460CEF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF5549D-33D5-420A-9B3E-6DF9312C4E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "37B08D35-81CD-40C1-B2D9-84D6E59CF0C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "A60CE6E6-9534-449B-A94A-BEBA13098168",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "11E4367A-457C-4B7F-9BE8-53E3D2B49619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA6C92F-E66D-452C-9270-6DFC4D7F1F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "F116BC45-BE30-4792-9608-EFB81C98474D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE8DDF0-7669-45BD-820C-81FC8E13155F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "601CA34B-CAC4-4ED9-8ACB-5A33CC094043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "4D045157-F49D-43B5-B72E-21E04169F6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F74F4DE-5345-4143-8491-E7309E382F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2A875FD5-EB5C-4656-AB9D-18C4B8292603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "2B674EC4-814A-47FD-AA07-F2771A69E8FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E3472F4F-8EB5-4FB1-A4D8-906C12881A19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "37EF3613-AC50-4247-944C-C458665586EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "0956BF1C-0002-496A-A016-6EB39241A6BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "6E1F0CCF-9850-4947-AB9B-B6B1F9B062D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1465E3-0262-4D2F-BE9F-283975E2333A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "B3165577-0B87-432C-9358-0AABDC43962F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "218A23E8-73D4-455C-9394-6815393FF16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "96AD6D79-11A9-495B-A2B5-72FB4F038285",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "F8670AD0-35C3-4438-A181-7521EC847A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC07A9F-315F-4568-BFE8-F0059DE1F9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "940393EB-8F83-4F7C-89B3-ACD8408DB042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "7020FE3C-4828-4A93-AB2A-468E560D8B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "453CDEAE-AC98-43E0-A911-81851218627C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "65AB86F2-B376-485F-B5B0-320F6ADA07BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C827210B-2416-4359-9332-E90FF4F21677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E12BA97C-1DCB-46D2-B0CB-1ACE81075706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E77F9AD8-D3A9-4F54-9FE4-92BBD2F46AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA6A477-7672-47EB-B87C-E1C6AAF50F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "88FE1585-45C4-429F-928A-C046ABCA9017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA2BCF0-C05B-41C5-96B5-C95DD436F8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "1869AC1F-51B0-4526-8EDA-DEF06C367451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF07485-398B-47D4-862A-95F7E5E290E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE93F86-E9A8-4998-BBF3-FF7EDD77B97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "69D2A024-111B-4277-8C98-65A68D08EBD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "38F6905E-F264-4646-A242-6594431F14A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0773B6A6-ABAD-44A6-B603-8223A6DFBB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "47E78806-7F68-4544-ADAE-C406320BE9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "1D036A01-44D0-4765-9A9A-FF85AF6F2288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "606B52C7-1B72-457E-88F8-F640D9680561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "1171554F-CD60-4828-B09F-067F15970A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "0D887445-7CD6-4F2A-BC42-CF695A68269E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "41F891F4-BB36-4B92-B87D-261CECA4DD15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2696E1-2EE9-4020-857A-2F548FB61D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87A0AD7B-23AC-4292-9572-1C3574327C95",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en el concentrador de acceso PPP (\"PPP Access Concentrator\" o PPPAC) en SEIL/x86 con firmware 1.00 hasta 1.61, SEIL/B1 con firmware 1.00 hasta 3.11, SEIL/X1 con firmware 1.00 hasta 3.11, SEIL/X2 con firmware 1.00 hasta 3.11, SEIL/Turbo con firmware 1.80 hasta 2.10, y SEIL/neu 2FE Plus con firmware 1.80 hasta 2.10 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete PPPoE."
}
],
"id": "CVE-2011-0454",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-03-01T23:00:02.800",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43494"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-2363
Vulnerability from fkie_nvd - Published: 2010-08-30 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0B23BF51-78E0-46B7-8288-16EB6C1D210C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "953C86E4-3E0F-4A75-BD27-EF8BE4F48894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D7717A-A3E4-45A8-A774-3C2855267FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A7500641-D607-4221-ADA2-CBCC338F22A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "21A290E5-32F5-42AE-BDE8-C92B84A44D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC7F97-3208-43EE-B931-A28CD9A3515F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3C03EE30-DC89-4926-A1FF-F878B4F9E205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "90546F95-8BA1-4F13-86F4-91F797528281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A47FE3-A7E3-41FF-81B2-A41CCB776924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "8B75E486-B21A-4155-A4F8-155CD3A2EB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "35A5F2AA-23C4-43D4-B355-A9971503E3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA78DB-5273-48F5-9350-EABAEE8FD79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "E805B146-572E-466E-BF0B-6B53970A72EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "86AAEE2F-8D63-4167-A6C8-DAD2F235015D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "C83696CE-91F3-4559-B16A-D1CF1C915515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF4C61B-393E-44E4-9404-BC331C8E8729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4E913E-1E8D-439B-8B77-35A54E42EC98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "C75C2643-7F2A-4C34-94A0-DCB60399EF07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "59204C16-8DC1-4BA0-9F73-560CC6D0E37B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A420F017-83DC-4029-A0F8-F50ED600CEA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2923D4A5-FD10-4846-B2F5-93C64DEB081E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07EB84-D033-423B-AD53-D7B47DC508C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CB31A5D1-6219-4E7D-965A-65C885C71C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4383E0DF-E0D2-4E59-8053-CFD57F4C11C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "25B9C033-965D-420F-8F71-C650592D5AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCB5982-5ECF-471C-8731-59AB4784055F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF907907-1E85-4F85-84ED-0DB73466186F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "429DBDFD-C32D-4888-BC36-FCE5896FC963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "809E64CE-504D-49BB-8C76-09D95F814893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC22870-8A4A-483E-AA38-325E1564E4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "07952D84-10F6-46D0-B896-89401F063888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB8C1C6-D47D-4A85-8997-9E356688DA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "07AB01A2-0CC3-49E6-B1A1-FF1BD918019E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "43F0BE07-FC42-4AB1-A553-1B254CC57D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1DADC38F-D530-49FC-A834-3BBC5FF71C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F76EDD89-9C58-40BE-B7AE-72E82D051641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "71B53A2B-FF57-42B1-957B-E01CC8DE087B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0D8323-9921-415C-B47C-49A947068F68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "EEBE6E5A-691F-46EF-B999-18ED949BF2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "11181F82-4A35-43AD-838E-E07092DF8652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9E04C4-EA46-4F14-A60B-12CAD9E98485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de la funcionalidad \"Reverse Path Forwarding\" (RPF) Unicast de IPv6 de los enrutadores SEIL/X1, SEIL/X2 y SEIL/B1 con firmware v1.00 hasta la v2.73, si el modo estricto (strict) es utilizado, no descarta apropiadamente paquetes, lo que puede permitir a atacantes remotos evitar las restricciones de acceso previstas a trav\u00e9s de una direcci\u00f3n IP falseada."
}
],
"id": "CVE-2010-2363",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-08-30T20:00:01.983",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/41088"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/41088"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4293
Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\/x1_firmware | 2.30 | |
| iij | seil\/x1_firmware | 2.40 | |
| iij | seil\/x1_firmware | 2.41 | |
| iij | seil\/x1_firmware | 2.42 | |
| iij | seil\/x1_firmware | 2.50 | |
| iij | seil\/x1_firmware | 2.51 | |
| iij | seil\/x1 | * | |
| iij | seil\/b1_firmware | 2.30 | |
| iij | seil\/b1_firmware | 2.40 | |
| iij | seil\/b1_firmware | 2.41 | |
| iij | seil\/b1_firmware | 2.42 | |
| iij | seil\/b1_firmware | 2.50 | |
| iij | seil\/b1_firmware | 2.51 | |
| iij | seil\/b1 | * | |
| iij | seil\/x2_firmware | 2.30 | |
| iij | seil\/x2_firmware | 2.40 | |
| iij | seil\/x2_firmware | 2.41 | |
| iij | seil\/x2_firmware | 2.42 | |
| iij | seil\/x2_firmware | 2.50 | |
| iij | seil\/x2_firmware | 2.51 | |
| iij | seil\/x2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
},
{
"lang": "es",
"value": "El firmware Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 desde v2.30 hasta v2.51, cuando NAT esta activado, permite a atacantes remotos producir una denegaci\u00f3n de servicio (reinicio de sistema) a trav\u00e9s de paquetes GRE manipulados."
}
],
"id": "CVE-2009-4293",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-12-10T23:30:00.420",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/59361"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/59361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4292
Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\/x1_firmware | 2.40 | |
| iij | seil\/x1_firmware | 2.41 | |
| iij | seil\/x1_firmware | 2.42 | |
| iij | seil\/x1_firmware | 2.50 | |
| iij | seil\/x1_firmware | 2.51 | |
| iij | seil\/x1 | * | |
| iij | seil\/b1_firmware | 2.40 | |
| iij | seil\/b1_firmware | 2.41 | |
| iij | seil\/b1_firmware | 2.42 | |
| iij | seil\/b1_firmware | 2.50 | |
| iij | seil\/b1_firmware | 2.51 | |
| iij | seil\/b1 | * | |
| iij | seil\/x2_firmware | 2.40 | |
| iij | seil\/x2_firmware | 2.41 | |
| iij | seil\/x2_firmware | 2.42 | |
| iij | seil\/x2_firmware | 2.50 | |
| iij | seil\/x2_firmware | 2.51 | |
| iij | seil\/x2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n de filtrado de URL en el firmware Internet Initiative Japan SEIL/X1, SEIL/X2, y SEIL/B1 desde la v2.40 hasta la v2.51 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar."
}
],
"id": "CVE-2009-4292",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-12-10T23:30:00.390",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/59362"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/59362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2015-0887 (GCVE-0-2015-0887)
Vulnerability from cvelistv5 – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:26:11.341Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-02-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-02-28T02:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0887",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01541.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-0887",
"datePublished": "2015-02-28T02:00:00",
"dateReserved": "2015-01-08T00:00:00",
"dateUpdated": "2024-08-06T04:26:11.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0454 (GCVE-0-2011-0454)
Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2011-000014",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"name": "http://www.seil.jp/support/security/a01001.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0454",
"datePublished": "2011-03-01T22:00:00",
"dateReserved": "2011-01-14T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2363 (GCVE-0-2010-2363)
Vulnerability from cvelistv5 – Published: 2010-08-30 19:00 – Updated: 2024-08-07 02:32
VLAI?
Summary
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.315Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-ipv6-spoofing(61382)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41088"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-ipv6-spoofing(61382)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41088"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2363",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-ipv6-spoofing(61382)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41088"
},
{
"name": "http://www.seil.jp/seilseries/security/2010/a00875.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2363",
"datePublished": "2010-08-30T19:00:00",
"dateReserved": "2010-06-21T00:00:00",
"dateUpdated": "2024-08-07T02:32:16.315Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4293 (GCVE-0-2009-4293)
Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4293",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"refsource": "OSVDB",
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4293",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4292 (GCVE-0-2009-4292)
Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4292",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-url-bo(54051)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"refsource": "OSVDB",
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4292",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0887 (GCVE-0-2015-0887)
Vulnerability from nvd – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:26:11.341Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-02-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-02-28T02:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0887",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01541.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-0887",
"datePublished": "2015-02-28T02:00:00",
"dateReserved": "2015-01-08T00:00:00",
"dateUpdated": "2024-08-06T04:26:11.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0454 (GCVE-0-2011-0454)
Vulnerability from nvd – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2011-000014",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"name": "http://www.seil.jp/support/security/a01001.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0454",
"datePublished": "2011-03-01T22:00:00",
"dateReserved": "2011-01-14T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2363 (GCVE-0-2010-2363)
Vulnerability from nvd – Published: 2010-08-30 19:00 – Updated: 2024-08-07 02:32
VLAI?
Summary
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.315Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-ipv6-spoofing(61382)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41088"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-ipv6-spoofing(61382)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41088"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2363",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-ipv6-spoofing(61382)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41088"
},
{
"name": "http://www.seil.jp/seilseries/security/2010/a00875.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2363",
"datePublished": "2010-08-30T19:00:00",
"dateReserved": "2010-06-21T00:00:00",
"dateUpdated": "2024-08-07T02:32:16.315Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4293 (GCVE-0-2009-4293)
Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4293",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"refsource": "OSVDB",
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4293",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4292 (GCVE-0-2009-4292)
Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-url-bo(54051)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4292",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-url-bo(54051)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"name": "JVN#06362164",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "JVNDB-2009-000069",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"name": "59362",
"refsource": "OSVDB",
"url": "http://osvdb.org/59362"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4292",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}