Search criteria

26 vulnerabilities found for seil\/x2 by iij

VAR-201103-0115

Vulnerability from variot - Updated: 2023-12-18 13:49

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------

Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).

http://secunia.com/company/events/mms_2011/


TITLE: SEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA43494

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43494/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

RELEASE DATE: 2011-03-18

DISCUSS ADVISORY: http://secunia.com/advisories/43494/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/43494/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in SEIL Routers, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is reported in the following products: * SEIL/x86 firmware 1.00 to 1.61. * SEIL/B1 firmware 1.00 to 3.11. * SEIL/X1 firmware 1.00 to 3.11. * SEIL/X2 firmware 1.00 to 3.11. * SEIL/Turbo firmware 1.80 to 2.10.

SOLUTION: Update to a patched version.

Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.seil.jp/support/security/a01001.html

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201103-0115",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.61"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.10"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.10"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 1.61"
      },
      {
        "model": "turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor",
    "sources": [
      {
        "db": "BID",
        "id": "46598"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-0454",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 8.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2011-000014",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "VHN-48399",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-0454",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2011-000014",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201103-009",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-48399",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow  vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA43494\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43494/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nRELEASE DATE:\n2011-03-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43494/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43494/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL Routers, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is reported in the following products:\n* SEIL/x86 firmware 1.00 to 1.61. \n* SEIL/B1 firmware 1.00 to 3.11. \n* SEIL/X1 firmware 1.00 to 3.11. \n* SEIL/X2 firmware 1.00 to 3.11. \n* SEIL/Turbo firmware 1.80 to 2.10. \n\nSOLUTION:\nUpdate to a patched version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.seil.jp/support/security/a01001.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN88991166",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454",
        "trust": 3.4
      },
      {
        "db": "SECUNIA",
        "id": "43494",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "46598",
        "trust": 2.2
      },
      {
        "db": "XF",
        "id": "65672",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#88991166",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "99440",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "id": "VAR-201103-0115",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      }
    ],
    "trust": 1.2042633255555555
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:49:15.771000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a01001(Japanese)",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01001.html"
      },
      {
        "title": "Patch for SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/3112"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/43494"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/46598"
      },
      {
        "trust": 1.8,
        "url": "http://www.seil.jp/support/security/a01001.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn88991166/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2011-000014"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0454"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/english/vuln/201102_seil_en.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/65672"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/en/jp/jvn88991166"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0454"
      },
      {
        "trust": 0.6,
        "url": "http://jvn.jp/jp/jvn88991166/index.htmlhttp"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/jp/jvn88991166/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/download/firmware/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/events/mms_2011/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43494/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43494/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "date": "2011-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "BID",
        "id": "46598"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "date": "2011-03-18T07:48:13",
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "date": "2011-03-01T23:00:02.800000",
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "date": "2011-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "BID",
        "id": "46598"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "date": "2017-08-17T01:33:30.930000",
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "date": "2011-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ],
    "trust": 0.6
  }
}

VAR-200912-0195

Vulnerability from variot - Updated: 2023-12-18 13:30

Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. Successfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA37154

VERIFY ADVISORY: http://secunia.com/advisories/37154/

DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

1) An error exists when processing of certain GRE packets.

Note: Successful exploitation requires that the NAT functionality is enabled.

2) A buffer overflow error exists within the URL filtering functionality. This can be exploited to cause a buffer overflow and potentially execute arbitrary code by tricking a user into visiting a specially crafted website.

Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.

SOLUTION: Update to version 2.52.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php

2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0195",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.30 to 2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.30 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.30 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT/CC",
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2009-4293",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-000070",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-41739",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2009-4293",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-000070",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200912-157",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-41739",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. \nSuccessfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. This can be exploited to cause a buffer overflow and\npotentially execute arbitrary code by tricking a user into visiting a\nspecially crafted website. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN13011682",
        "trust": 2.9
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "37154",
        "trust": 2.7
      },
      {
        "db": "OSVDB",
        "id": "59361",
        "trust": 2.5
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3111",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070",
        "trust": 2.5
      },
      {
        "db": "XF",
        "id": "54050",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#13011682",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN06362164",
        "trust": 0.4
      },
      {
        "db": "BID",
        "id": "36896",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-41739",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82299",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "id": "VAR-200912-0195",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      }
    ],
    "trust": 0.5871794866666666
  },
  "last_update_date": "2023-12-18T13:30:13.771000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00674.php",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-16",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://jvn.jp/en/jp/jvn13011682/index.html"
      },
      {
        "trust": 2.5,
        "url": "http://osvdb.org/59361"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/37154"
      },
      {
        "trust": 2.5,
        "url": "http://www.vupen.com/english/advisories/2009/3111"
      },
      {
        "trust": 2.1,
        "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000070.html"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/54050"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4293"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4293"
      },
      {
        "trust": 0.4,
        "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn06362164/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn13011682/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn06362164/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37154/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "date": "2009-10-28T10:48:16",
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "date": "2009-12-10T23:30:00.420000",
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "date": "2009-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "date": "2010-08-11T11:34:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "date": "2017-08-17T01:31:31.773000",
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "date": "2009-12-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X Series and SEIL/B1 denial of service vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "configuration error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ],
    "trust": 0.6
  }
}

VAR-200912-0194

Vulnerability from variot - Updated: 2023-12-18 13:30

Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA37154

VERIFY ADVISORY: http://secunia.com/advisories/37154/

DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

1) An error exists when processing of certain GRE packets. This can be exploited to cause the device to restart by sending certain specially crafted GRE packets.

Note: Successful exploitation requires that the NAT functionality is enabled.

2) A buffer overflow error exists within the URL filtering functionality.

Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.

SOLUTION: Update to version 2.52.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php

2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0194",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.40 to 2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.40 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.40 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT/CC",
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2009-4292",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 9.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-000069",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-41738",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2009-4292",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-000069",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200912-156",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-41738",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. This can\nbe exploited to cause the device to restart by sending certain\nspecially crafted GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN06362164",
        "trust": 2.9
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "37154",
        "trust": 2.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3111",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "59362",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "54050",
        "trust": 0.8
      },
      {
        "db": "OSVDB",
        "id": "59361",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#06362164",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "54051",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN13011682",
        "trust": 0.4
      },
      {
        "db": "BID",
        "id": "36896",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-41738",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82299",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "id": "VAR-200912-0194",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      }
    ],
    "trust": 0.5871794866666666
  },
  "last_update_date": "2023-12-18T13:30:13.735000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00669.php",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://jvn.jp/en/jp/jvn06362164/index.html"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/37154"
      },
      {
        "trust": 2.5,
        "url": "http://www.vupen.com/english/advisories/2009/3111"
      },
      {
        "trust": 2.1,
        "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000069.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/59362"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4292"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/54050"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4292"
      },
      {
        "trust": 0.8,
        "url": "http://osvdb.org/59361"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/54051"
      },
      {
        "trust": 0.4,
        "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn13011682/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn13011682/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn06362164/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37154/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "date": "2009-10-28T10:48:16",
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "date": "2009-12-10T23:30:00.390000",
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "date": "2009-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "date": "2010-08-11T11:34:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "date": "2017-08-17T01:31:31.693000",
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "date": "2009-12-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X Series and SEIL/B1 buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ],
    "trust": 0.6
  }
}

VAR-201310-0458

Vulnerability from variot - Updated: 2023-12-18 13:29

The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. Attackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. The following products are vulnerable: SEIL/x86 1.00 through 2.81 SEIL/X1 1.00 through 4.31 SEIL/X2 1.00 through 4.31 SEIL/B1 1.00 through 4.31 SEIL/Turbo 2.05 through 2.15 SEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0458",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.15"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.15"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.80"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.81"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.80"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62612"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4708",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000091",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-13386",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-64710",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-4708",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000091",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13386",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201309-504",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64710",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. \nAttackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. \nThe following products are vulnerable:\nSEIL/x86 1.00 through 2.81\nSEIL/X1 1.00 through 4.31\nSEIL/X2 1.00 through 4.31\nSEIL/B1 1.00 through 4.31\nSEIL/Turbo 2.05 through 2.15\nSEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN40079308",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "97619",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "62612",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504",
        "trust": 0.7
      },
      {
        "db": "SECUNIA",
        "id": "54818",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#40079308",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "id": "VAR-201310-0458",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      }
    ],
    "trust": 1.2519099900000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:29:52.352000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01388.html"
      },
      {
        "title": "SEIL Multiple Products RADIUS Verification Random Number Generation Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/39884"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.seil.jp/support/security/a01388.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn40079308/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/ja/contents/2013/jvndb-2013-000091.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/97619"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4708"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/en/jp/jvn40079308/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4708"
      },
      {
        "trust": 0.6,
        "url": "http://www.secunia.com/advisories/54818/"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/62612"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/jp/jvn40079308/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "date": "2013-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62612"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "date": "2013-10-01T17:55:03.647000",
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "date": "2013-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "date": "2013-10-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62612"
      },
      {
        "date": "2013-10-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "date": "2013-10-07T14:06:42.800000",
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "date": "2014-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable in RADIUS authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ],
    "trust": 0.6
  }
}

VAR-201309-0394

Vulnerability from variot - Updated: 2023-12-18 13:14

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan's SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data Attackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0394",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.05 to 2.15"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.05 to 2.15"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.81"
      },
      {
        "model": "seil/neu 2fe plus to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "2.052.15"
      },
      {
        "model": "seil/turbo to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "2.052.15"
      },
      {
        "model": "seil/b1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x2 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x86 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.002.81"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.05"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.05"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x86",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.82"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.81"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x2_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x2_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62593"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4709",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000092",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-13230",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-64711",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-4709",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000092",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13230",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201309-351",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64711",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan\u0027s SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow  vulnerability because they fails to sufficiently bounds check user-supplied data\nAttackers can exploit this issue to execute  arbitrary code in context of the  affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092",
        "trust": 2.8
      },
      {
        "db": "JVN",
        "id": "JVN43152129",
        "trust": 2.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#43152129",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "62593",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "id": "VAR-201309-0394",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      }
    ],
    "trust": 1.1914468853333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:14:55.037000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01396.html"
      },
      {
        "title": "Patch for SEIL Series Router PPPACL L2TP Message Processing Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/39771"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.seil.jp/support/security/a01396.html"
      },
      {
        "trust": 2.0,
        "url": "http://jvn.jp/en/jp/jvn43152129/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000092"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4709"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/en/jp/jvn43152129/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=http://support.apple.com/kb/cve-2013-4709"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/download/firmware/"
      },
      {
        "trust": 0.3,
        "url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000092.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62593"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "date": "2013-09-20T15:26:04.230000",
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "date": "2013-09-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "date": "2015-03-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62593"
      },
      {
        "date": "2013-09-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "date": "2015-03-05T13:24:10.220000",
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "date": "2014-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ],
    "trust": 0.6
  }
}

VAR-201406-0099

Vulnerability from variot - Updated: 2023-12-18 13:09

The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. The following are vulnerable: SEIL/x86 1.00 to 3.10 SEIL/X1 1.00 to 4.50 SEIL/X2 1.00 to 4.50 SEIL/B1 1.00 to 4.50 SEIL/Turbo 1.80 to 2.17 SEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0099",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.82"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.50"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.50"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.17"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.17"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.10"
      },
      {
        "model": "seil/neu 2fe plus to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.802.17"
      },
      {
        "model": "seil/turbo to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.802.17"
      },
      {
        "model": "seil/b1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x2 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x86 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.003.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.16:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.16:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:3.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.82:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "68041"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-2004",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2014-000055",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-03732",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-69943",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-2004",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2014-000055",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-03732",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201406-323",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-69943",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. \nThe following are vulnerable:\nSEIL/x86 1.00 to 3.10\nSEIL/X1 1.00 to 4.50\nSEIL/X2 1.00 to 4.50\nSEIL/B1 1.00 to 4.50\nSEIL/Turbo 1.80 to 2.17\nSEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVN10724763",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "68041",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "id": "VAR-201406-0099",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      }
    ],
    "trust": 1.2151310215384614
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:09:21.202000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01443.html"
      },
      {
        "title": "SEIL Series Routers patch for remote denial of service vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/46479"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn10724763/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01443.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000055"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2004"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2004"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/68041"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "date": "2014-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "BID",
        "id": "68041"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "date": "2014-06-16T14:55:05.893000",
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "date": "2014-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "BID",
        "id": "68041"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "date": "2014-06-16T17:10:13.190000",
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ],
    "trust": 0.6
  }
}

VAR-201502-0480

Vulnerability from variot - Updated: 2023-12-18 12:30

npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. The following products are vulnerable: SEIL/x86 Fuji 1.00 through 3.30 SEIL/X1 3.50 through 4.70 SEIL/X2 3.50 through 4.70 SEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0480",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.29"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.28"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.26"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.35"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.27"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.33"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.34"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.46"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.90"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.96"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.95"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.05"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.04"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.90"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.60"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.93"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.45"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.89"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.19"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.82"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.22"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.99"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.14"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.13"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.83"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.87"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.71"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.78"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.74"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.12"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.44"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.92"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.11"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.25"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.51"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.56"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.39"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.49"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.13"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.58"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.16"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.34"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.21"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.98"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.03"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.40"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.07"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.00"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.19"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.85"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.18"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.65"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.48"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.79"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.47"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.17"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.55"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.57"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.87"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.88"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.21"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.77"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.34"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.79"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.40"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.18"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.78"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.15"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.84"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.86"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.76"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.08"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.36"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.06"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.24"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.86"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.14"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.97"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.94"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.59"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.88"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.43"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.23"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.89"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.97"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.67"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.37"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.77"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.66"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.71"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.09"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.69"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.12"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.76"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.72"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.38"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.64"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.54"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.73"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.34"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.68"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.50 to 4.70"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.50 to 4.70"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.50 to 4.70"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.30"
      },
      {
        "model": "seil/b1 routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.50-4.70"
      },
      {
        "model": "seil/x2 routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.50-4.70"
      },
      {
        "model": "seil/x1 router",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.50-4.70"
      },
      {
        "model": "seil/x86 fuji routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "1.00-3.30"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.30"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.22"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.70"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.70"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.62"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.70"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.62"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.70"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.62"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.50"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.81:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.82:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.83:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.84:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.85:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.98:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.99:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.16:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.18:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.33:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.34:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.35:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.48:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.49:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.65:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.66:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.67:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.68:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.82:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.83:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.84:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.85:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.98:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.99:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.15:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.16:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.18:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.73:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.74:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.76:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.92:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.93:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.06:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.07:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.08:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.09:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.24:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.26:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.57:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.59:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.73:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.74:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.76:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.77:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.92:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.93:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.07:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.08:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.09:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.77:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.79:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.86:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.88:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.95:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.97:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.02:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.04:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.13:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.22:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.29:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.38:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.45:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.47:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.54:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.79:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.81:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.86:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.88:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.95:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.97:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.04:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.06:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.13:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.78:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.87:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.89:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.94:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.96:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.14:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.19:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.21:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.28:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.37:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.39:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.44:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.55:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.64:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.69:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.71:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.78:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.80:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.87:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.89:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.94:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.96:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.03:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.05:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.14:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.19:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.21:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.34:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.34:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.91:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.34:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.90:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.75:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT",
    "sources": [
      {
        "db": "BID",
        "id": "72884"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-0887",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2015-000031",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-01395",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-78833",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-0887",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2015-000031",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-01395",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201502-477",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-78833",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. \nThe following products are vulnerable:\nSEIL/x86 Fuji 1.00 through 3.30\nSEIL/X1 3.50 through 4.70\nSEIL/X2 3.50 through 4.70\nSEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-0887",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN63949115",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031",
        "trust": 2.5
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "72884",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "id": "VAR-201502-0480",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      }
    ],
    "trust": 1.4576923075
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:30:23.515000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01541.html"
      },
      {
        "title": "SEIL Router PPP Access Concentrator Denial of Service Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/55765"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn63949115/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01541.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2015-000031"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0887"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0887"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": " http://www.seil.jp/support/security/a01541.html  "
      },
      {
        "trust": 0.3,
        "url": "jvn.jp/en/jp/jvn63949115/index.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "date": "2015-02-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "date": "2015-02-27T00:00:00",
        "db": "BID",
        "id": "72884"
      },
      {
        "date": "2015-02-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "date": "2015-02-28T02:59:37.923000",
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "date": "2015-02-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "date": "2015-03-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "date": "2015-05-07T17:28:00",
        "db": "BID",
        "id": "72884"
      },
      {
        "date": "2015-03-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "date": "2015-03-04T17:20:43.703000",
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "date": "2015-03-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ],
    "trust": 0.6
  }
}

VAR-201008-0257

Vulnerability from variot - Updated: 2023-12-18 12:22

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------

Secunia receives 'Frost & Sullivan's Global 2010 Customer Value Enhancement Award

Secunia outshines its competitors and receives the Frost & Sullivan’s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost & Sullivan concluded:

"Secunia provides tremendous value for their customers, end-users, and to other security vendors."

Read more: http://secunia.com/blog/117/


TITLE: SEIL Routers IPv6 Unicast RPF Spoofing Vulnerability

SECUNIA ADVISORY ID: SA41088

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41088/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41088

RELEASE DATE: 2010-08-26

DISCUSS ADVISORY: http://secunia.com/advisories/41088/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/41088/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=41088

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to conduct spoofing attacks.

The vulnerability is reported in the following products: * SEIL/X1 firmware version 1.00 through 2.73 * SEIL/X2 firmware version 1.00 through 2.73 * SEIL/B1 firmware version 1.00 through 2.73

SOLUTION: Upgrade to firmware version 2.74.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2010/a00875.php

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201008-0257",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 to 2.73"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 to 2.73"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 to 2.73"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.00"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "78900"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2010-2363",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2010-000032",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-44968",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2010-2363",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2010-2363",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2010-000032",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201008-364",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-44968",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2010-2363",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------\n\n\nSecunia receives \u0027Frost \u0026 Sullivan\u0027s Global 2010 Customer Value Enhancement Award\n\nSecunia outshines its competitors and receives the Frost \u0026 Sullivan\u2019s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost \u0026 Sullivan concluded:\n\n\"Secunia provides tremendous value for their customers, end-users, and to other security vendors.\"\n\nRead more: http://secunia.com/blog/117/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers IPv6 Unicast RPF Spoofing Vulnerability\n\nSECUNIA ADVISORY ID:\nSA41088\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41088/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nRELEASE DATE:\n2010-08-26\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41088/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41088/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL routers, which can be\nexploited by malicious people to conduct spoofing attacks. \n\nThe vulnerability is reported in the following products:\n* SEIL/X1 firmware version 1.00 through 2.73\n* SEIL/X2 firmware version 1.00 through 2.73\n* SEIL/B1 firmware version 1.00 through 2.73\n\nSOLUTION:\nUpgrade to firmware version 2.74. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/seilseries/security/2010/a00875.php\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-2363",
        "trust": 2.9
      },
      {
        "db": "JVN",
        "id": "JVN12683004",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "41088",
        "trust": 1.3
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#12683004",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "78900",
        "trust": 0.5
      },
      {
        "db": "XF",
        "id": "61382",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-44968",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "93040",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "id": "VAR-201008-0257",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:22:29.688000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00875",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://jvn.jp/en/jp/jvn12683004/index.html"
      },
      {
        "trust": 2.2,
        "url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
      },
      {
        "trust": 1.8,
        "url": "http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000032.html"
      },
      {
        "trust": 1.2,
        "url": "http://secunia.com/advisories/41088"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2363"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2363"
      },
      {
        "trust": 0.3,
        "url": "http://xforce.iss.net/xforce/xfdb/61382"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/264.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/78900"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/41088/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/41088/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/blog/117/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-08-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "BID",
        "id": "78900"
      },
      {
        "date": "2010-08-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "date": "2010-08-25T05:39:54",
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "date": "2010-08-30T20:00:01.983000",
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "BID",
        "id": "78900"
      },
      {
        "date": "2010-08-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "date": "2017-08-17T01:32:43.103000",
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "date": "2010-09-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ],
    "trust": 0.6
  }
}

FKIE_CVE-2014-2004

Vulnerability from fkie_nvd - Published: 2014-06-16 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D60C9B1-33AE-42B8-9521-20AF2351458A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C201F596-859B-4C9D-9043-5C82D75ADF93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "834A5422-67BC-4036-A007-60B41956D199",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A637B6-3EC2-4BD8-89B4-3B259140412E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A44489-81E0-49F1-91EB-1E3CAA780313",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "32543A8B-CD82-4B84-A4C2-EC4B18A0DAC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A2F64E-4C0E-47F8-B314-3A4B101F23B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C5DA19-0661-4735-AE91-E65EB59850EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "85398E2A-B6E0-40ED-855F-7EFEFE350B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE60DCDF-C5A6-4BC8-9E5A-B2DA63517CCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02919BA-9D40-4882-A2E0-BE02EBF18862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6DEE92C-0381-479B-8EA6-DB6EEE216764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8A57950-024E-4F86-ADC5-6ED33966CD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0073D30-C4C7-4E12-A53D-4116496E3677",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA8CA61-D4F6-4A11-87FC-E0898C73A04E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "11EAE136-B926-4FFE-B799-C13356F1848F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8330E7-F52F-4C12-A07F-FBD3C01D382A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E686229-8BBE-48C0-B953-DF6B82A2B2D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB1D5F4-986D-4D3F-800B-2BDD2EDE7DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE74E12-BDED-4459-89F9-18B0D621BF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09830F5-3D79-455E-B211-A7B46318C83C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B80FBBD-1972-451A-98F2-80318DD37FF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
    },
    {
      "lang": "es",
      "value": "PPP Access Concentrator (PPPAC) en routers SEIL SEIL/x86 1.00 hasta 3.10, routers SEIL/X1 1.00 hasta 4.50, routers SEIL/X2 1.00 hasta 4.50, routers SEIL/B1 1.00 hasta 4.50, routers SEIL/Turbo 1.80 hasta 2.17 y routers SEIL/neu 2FE Plus 1.80 hasta 2.17 permite a atacantes remotos causar una denegaci\u00f3n de servicio (terminaci\u00f3n de sesi\u00f3n o interrupci\u00f3n de concentrador) a trav\u00e9s de un paquete TCP manipulado."
    }
  ],
  "id": "CVE-2014-2004",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-16T14:55:05.893",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.seil.jp/support/security/a01443.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.seil.jp/support/security/a01443.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4708

Vulnerability from fkie_nvd - Published: 2013-10-01 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA8CA61-D4F6-4A11-87FC-E0898C73A04E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB1D5F4-986D-4D3F-800B-2BDD2EDE7DC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02919BA-9D40-4882-A2E0-BE02EBF18862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8A57950-024E-4F86-ADC5-6ED33966CD73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A2F64E-4C0E-47F8-B314-3A4B101F23B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D60C9B1-33AE-42B8-9521-20AF2351458A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A637B6-3EC2-4BD8-89B4-3B259140412E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
    },
    {
      "lang": "es",
      "value": "El PPP Access Concentrator (PPPAC) en Internet Initiative Japan Inc. SEIL/x86 1.00 hasta la versi\u00f3n 2.80, SEIL/X1 1.00 hasta 4.30, SEIL/X2 1.00 hasta 4.30, SEIL/B1 1.00 hasta 4.30, SEIL/Turbo 1.80 hasta 2.15, y SEIL/neu 2FE Plus 1.80 hasta la versi\u00f3n 2.15 genera n\u00fameros aleatorios predecibles, lo que permite a atacantes remotos evadir la autenticaci\u00f3n RADIUS interceptando el tr\u00e1fico de RADIUS."
    }
  ],
  "id": "CVE-2013-4708",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-10-01T17:55:03.647",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://osvdb.org/97619"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01388.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/97619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01388.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4709

Vulnerability from fkie_nvd - Published: 2013-09-20 15:26 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_x2_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D5F850-2020-4951-9D8A-1B50E4F8541C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_x2_firmware:4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FD9501-0A71-4060-898B-5D2CC101DE1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE74E12-BDED-4459-89F9-18B0D621BF0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C5DA19-0661-4735-AE91-E65EB59850EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "11EAE136-B926-4FFE-B799-C13356F1848F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer en PPP Access Concentrator (PPPAC) en SEIL/x86 con firmware anterior a 2.82, SEIL/X1 con firmware anterior a 4.32, SEIL/X2 con firmware anterior a 4.32, SEIL/B1 con firmware anterior a 4.32, SEIL/Turbo con firmware anterior a 2.16, y SEIL/neu 2FE Plus con firmware anterior a 2.16 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un mensaje L2PT manipulado."
    }
  ],
  "id": "CVE-2013-4709",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-09-20T15:26:04.230",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01396.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01396.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0454

Vulnerability from fkie_nvd - Published: 2011-03-01 23:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Impacted products
Vendor Product Version
iij seil\/b1_firmware 1.00
iij seil\/b1_firmware 2.01
iij seil\/b1_firmware 2.10
iij seil\/b1_firmware 2.20
iij seil\/b1_firmware 2.30
iij seil\/b1_firmware 2.40
iij seil\/b1_firmware 2.41
iij seil\/b1_firmware 2.42
iij seil\/b1_firmware 2.50
iij seil\/b1_firmware 2.51
iij seil\/b1_firmware 2.52
iij seil\/b1_firmware 2.60
iij seil\/b1_firmware 2.61
iij seil\/b1_firmware 2.62
iij seil\/b1_firmware 2.63
iij seil\/b1_firmware 2.70
iij seil\/b1_firmware 2.72
iij seil\/b1_firmware 2.73
iij seil\/b1_firmware 2.74
iij seil\/b1_firmware 2.75
iij seil\/b1_firmware 3.01
iij seil\/b1_firmware 3.02
iij seil\/b1_firmware 3.10
iij seil\/b1_firmware 3.11
iij seil\/b1 *
iij seil\/x1_firmware 1.00
iij seil\/x1_firmware 1.10
iij seil\/x1_firmware 1.11
iij seil\/x1_firmware 1.20
iij seil\/x1_firmware 1.21
iij seil\/x1_firmware 1.22
iij seil\/x1_firmware 1.30
iij seil\/x1_firmware 1.31
iij seil\/x1_firmware 1.32
iij seil\/x1_firmware 1.40
iij seil\/x1_firmware 1.41
iij seil\/x1_firmware 1.43
iij seil\/x1_firmware 1.44
iij seil\/x1_firmware 2.10
iij seil\/x1_firmware 2.20
iij seil\/x1_firmware 2.30
iij seil\/x1_firmware 2.40
iij seil\/x1_firmware 2.41
iij seil\/x1_firmware 2.42
iij seil\/x1_firmware 2.50
iij seil\/x1_firmware 2.51
iij seil\/x1_firmware 2.52
iij seil\/x1_firmware 2.60
iij seil\/x1_firmware 2.61
iij seil\/x1_firmware 2.62
iij seil\/x1_firmware 2.63
iij seil\/x1_firmware 2.70
iij seil\/x1_firmware 2.72
iij seil\/x1_firmware 2.73
iij seil\/x1_firmware 2.74
iij seil\/x1_firmware 2.75
iij seil\/x1_firmware 3.01
iij seil\/x1_firmware 3.02
iij seil\/x1_firmware 3.10
iij seil\/x1_firmware 3.11
iij seil\/x1 *
iij seil\/x2_firmware 1.00
iij seil\/x2_firmware 1.10
iij seil\/x2_firmware 1.11
iij seil\/x2_firmware 1.20
iij seil\/x2_firmware 1.21
iij seil\/x2_firmware 1.22
iij seil\/x2_firmware 1.30
iij seil\/x2_firmware 1.31
iij seil\/x2_firmware 1.32
iij seil\/x2_firmware 1.40
iij seil\/x2_firmware 1.41
iij seil\/x2_firmware 1.43
iij seil\/x2_firmware 1.44
iij seil\/x2_firmware 2.10
iij seil\/x2_firmware 2.20
iij seil\/x2_firmware 2.30
iij seil\/x2_firmware 2.40
iij seil\/x2_firmware 2.41
iij seil\/x2_firmware 2.42
iij seil\/x2_firmware 2.50
iij seil\/x2_firmware 2.51
iij seil\/x2_firmware 2.52
iij seil\/x2_firmware 2.60
iij seil\/x2_firmware 2.61
iij seil\/x2_firmware 2.62
iij seil\/x2_firmware 2.63
iij seil\/x2_firmware 2.70
iij seil\/x2_firmware 2.72
iij seil\/x2_firmware 2.73
iij seil\/x2_firmware 2.74
iij seil\/x2_firmware 2.75
iij seil\/x2_firmware 3.01
iij seil\/x2_firmware 3.02
iij seil\/x2_firmware 3.10
iij seil\/x2_firmware 3.11
iij seil\/x2 *
iij seil\/x86_firmware 1.00
iij seil\/x86_firmware 1.61
iij seil\/x86 *
iij seil\/turbo_firmware 1.80
iij seil\/turbo_firmware 1.81
iij seil\/turbo_firmware 1.82
iij seil\/turbo_firmware 1.83
iij seil\/turbo_firmware 1.84
iij seil\/turbo_firmware 1.85
iij seil\/turbo_firmware 1.90
iij seil\/turbo_firmware 1.91
iij seil\/turbo_firmware 1.92
iij seil\/turbo_firmware 1.93
iij seil\/turbo_firmware 1.94
iij seil\/turbo_firmware 1.95
iij seil\/turbo_firmware 1.96
iij seil\/turbo_firmware 1.98
iij seil\/turbo_firmware 1.99
iij seil\/turbo_firmware 2.00
iij seil\/turbo_firmware 2.01
iij seil\/turbo_firmware 2.02
iij seil\/turbo_firmware 2.03
iij seil\/turbo_firmware 2.04
iij seil\/turbo_firmware 2.05
iij seil\/turbo_firmware 2.06
iij seil\/turbo_firmware 2.07
iij seil\/turbo_firmware 2.08
iij seil\/turbo_firmware 2.09
iij seil\/turbo_firmware 2.10
iij seil\/turbo *
iij seil\/neu_2fe_plus_firmware 1.80
iij seil\/neu_2fe_plus_firmware 1.81
iij seil\/neu_2fe_plus_firmware 1.82
iij seil\/neu_2fe_plus_firmware 1.83
iij seil\/neu_2fe_plus_firmware 1.84
iij seil\/neu_2fe_plus_firmware 1.85
iij seil\/neu_2fe_plus_firmware 1.90
iij seil\/neu_2fe_plus_firmware 1.91
iij seil\/neu_2fe_plus_firmware 1.92
iij seil\/neu_2fe_plus_firmware 1.93
iij seil\/neu_2fe_plus_firmware 1.94
iij seil\/neu_2fe_plus_firmware 1.95
iij seil\/neu_2fe_plus_firmware 1.96
iij seil\/neu_2fe_plus_firmware 1.98
iij seil\/neu_2fe_plus_firmware 1.99
iij seil\/neu_2fe_plus_firmware 2.00
iij seil\/neu_2fe_plus_firmware 2.01
iij seil\/neu_2fe_plus_firmware 2.02
iij seil\/neu_2fe_plus_firmware 2.03
iij seil\/neu_2fe_plus_firmware 2.04
iij seil\/neu_2fe_plus_firmware 2.05
iij seil\/neu_2fe_plus_firmware 2.06
iij seil\/neu_2fe_plus_firmware 2.07
iij seil\/neu_2fe_plus_firmware 2.08
iij seil\/neu_2fe_plus_firmware 2.09
iij seil\/neu_2fe_plus_firmware 2.10
iij seil\/neu_2fe_plus *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F0BE07-FC42-4AB1-A553-1B254CC57D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DADC38F-D530-49FC-A834-3BBC5FF71C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76EDD89-9C58-40BE-B7AE-72E82D051641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B53A2B-FF57-42B1-957B-E01CC8DE087B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0D8323-9921-415C-B47C-49A947068F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEBE6E5A-691F-46EF-B999-18ED949BF2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "11181F82-4A35-43AD-838E-E07092DF8652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9E04C4-EA46-4F14-A60B-12CAD9E98485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "1108097E-7B13-41A8-A6FC-0F958BFEB94F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB61B92-399A-45AD-A2EB-886F01DE57D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0928B5-60AB-4F2B-BF12-EEFF0CC38CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C0244F-E26B-45E6-A14F-0482B22C4E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D4FF3BD-1659-4582-AF3E-385829001579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F107CD-7985-4529-B9CB-F15C9EE80975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C947580-1489-4B27-A740-1A5853170E89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C2D29BB-DAEC-4D24-AA79-E7F136D37B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B23BF51-78E0-46B7-8288-16EB6C1D210C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "953C86E4-3E0F-4A75-BD27-EF8BE4F48894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3D7717A-A3E4-45A8-A774-3C2855267FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7500641-D607-4221-ADA2-CBCC338F22A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A290E5-32F5-42AE-BDE8-C92B84A44D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BC7F97-3208-43EE-B931-A28CD9A3515F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C03EE30-DC89-4926-A1FF-F878B4F9E205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "90546F95-8BA1-4F13-86F4-91F797528281",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A47FE3-A7E3-41FF-81B2-A41CCB776924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B75E486-B21A-4155-A4F8-155CD3A2EB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "35A5F2AA-23C4-43D4-B355-A9971503E3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EA78DB-5273-48F5-9350-EABAEE8FD79A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "E805B146-572E-466E-BF0B-6B53970A72EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "86AAEE2F-8D63-4167-A6C8-DAD2F235015D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83696CE-91F3-4559-B16A-D1CF1C915515",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF4C61B-393E-44E4-9404-BC331C8E8729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4E913E-1E8D-439B-8B77-35A54E42EC98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75C2643-7F2A-4C34-94A0-DCB60399EF07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B8E0B95-CFD0-4501-B98E-FC05113F7022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F916DA4-79A9-4523-907C-812E3FDF69FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9E82EF-2A12-4A7F-8559-D8D2147FB74D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEE64C1-72A3-42FF-A13F-7F3E5F41F53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC574B6-B448-4A51-B5A0-2F521205D4DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A0080D-3532-46E2-AC7D-F3E3E73622D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "59204C16-8DC1-4BA0-9F73-560CC6D0E37B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "A420F017-83DC-4029-A0F8-F50ED600CEA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2923D4A5-FD10-4846-B2F5-93C64DEB081E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D07EB84-D033-423B-AD53-D7B47DC508C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB31A5D1-6219-4E7D-965A-65C885C71C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4383E0DF-E0D2-4E59-8053-CFD57F4C11C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B9C033-965D-420F-8F71-C650592D5AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CCB5982-5ECF-471C-8731-59AB4784055F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF907907-1E85-4F85-84ED-0DB73466186F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "429DBDFD-C32D-4888-BC36-FCE5896FC963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "809E64CE-504D-49BB-8C76-09D95F814893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FC22870-8A4A-483E-AA38-325E1564E4AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "07952D84-10F6-46D0-B896-89401F063888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BB8C1C6-D47D-4A85-8997-9E356688DA24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AB01A2-0CC3-49E6-B1A1-FF1BD918019E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "38FA01CD-625E-4DE4-8898-725AF4D8D2B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "88B39BDF-A579-4C67-98E8-C017F426076C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "6285D504-1960-42B4-8F7B-1AEDEB9AE865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F9FFA1-A224-473B-9827-7F5F40A20837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3F86FC7-A7B2-4A58-9CDA-3056CE4C9AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "35160F7C-5804-4A43-96F8-31456EED7DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "486D5372-371D-4E43-B2AA-2E7236C8BDB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "73301872-EFC2-4E08-B166-ECBBEC6DB310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C2C21D-8DEA-4BD4-B116-875DAF8F9AB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB84E030-ADCF-4A17-878C-BE6FD000DA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "D157BDC2-5ABA-4B94-B497-7814656FB4DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57A7B71-F867-4229-96C5-F92DA246965D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8B532D-A45C-4111-A251-2BD9130DA95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235CD04-35C6-4682-A106-843CF8E46110",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A112F5-13F8-462E-87CF-AB2CC460CEF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5549D-33D5-420A-9B3E-6DF9312C4E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "37B08D35-81CD-40C1-B2D9-84D6E59CF0C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "A60CE6E6-9534-449B-A94A-BEBA13098168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E4367A-457C-4B7F-9BE8-53E3D2B49619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA6C92F-E66D-452C-9270-6DFC4D7F1F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "F116BC45-BE30-4792-9608-EFB81C98474D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE8DDF0-7669-45BD-820C-81FC8E13155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CA34B-CAC4-4ED9-8ACB-5A33CC094043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D045157-F49D-43B5-B72E-21E04169F6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F74F4DE-5345-4143-8491-E7309E382F25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A875FD5-EB5C-4656-AB9D-18C4B8292603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B674EC4-814A-47FD-AA07-F2771A69E8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3472F4F-8EB5-4FB1-A4D8-906C12881A19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "37EF3613-AC50-4247-944C-C458665586EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "0956BF1C-0002-496A-A016-6EB39241A6BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E1F0CCF-9850-4947-AB9B-B6B1F9B062D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF1465E3-0262-4D2F-BE9F-283975E2333A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3165577-0B87-432C-9358-0AABDC43962F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "218A23E8-73D4-455C-9394-6815393FF16D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AD6D79-11A9-495B-A2B5-72FB4F038285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8670AD0-35C3-4438-A181-7521EC847A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC07A9F-315F-4568-BFE8-F0059DE1F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "940393EB-8F83-4F7C-89B3-ACD8408DB042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "7020FE3C-4828-4A93-AB2A-468E560D8B5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "453CDEAE-AC98-43E0-A911-81851218627C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AB86F2-B376-485F-B5B0-320F6ADA07BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "C827210B-2416-4359-9332-E90FF4F21677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E12BA97C-1DCB-46D2-B0CB-1ACE81075706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77F9AD8-D3A9-4F54-9FE4-92BBD2F46AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA6A477-7672-47EB-B87C-E1C6AAF50F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FE1585-45C4-429F-928A-C046ABCA9017",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA2BCF0-C05B-41C5-96B5-C95DD436F8D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "1869AC1F-51B0-4526-8EDA-DEF06C367451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF07485-398B-47D4-862A-95F7E5E290E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE93F86-E9A8-4998-BBF3-FF7EDD77B97C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D2A024-111B-4277-8C98-65A68D08EBD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F6905E-F264-4646-A242-6594431F14A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0773B6A6-ABAD-44A6-B603-8223A6DFBB19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E78806-7F68-4544-ADAE-C406320BE9B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D036A01-44D0-4765-9A9A-FF85AF6F2288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "606B52C7-1B72-457E-88F8-F640D9680561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "1171554F-CD60-4828-B09F-067F15970A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D887445-7CD6-4F2A-BC42-CF695A68269E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F891F4-BB36-4B92-B87D-261CECA4DD15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE2696E1-2EE9-4020-857A-2F548FB61D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A0AD7B-23AC-4292-9572-1C3574327C95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer en el concentrador de acceso PPP (\"PPP Access Concentrator\" o PPPAC) en SEIL/x86 con firmware 1.00 hasta 1.61, SEIL/B1 con firmware 1.00 hasta 3.11, SEIL/X1 con firmware 1.00 hasta 3.11, SEIL/X2 con firmware 1.00 hasta 3.11, SEIL/Turbo con firmware 1.80 hasta 2.10, y SEIL/neu 2FE Plus con firmware 1.80 hasta 2.10 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete PPPoE."
    }
  ],
  "id": "CVE-2011-0454",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-01T23:00:02.800",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43494"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.securityfocus.com/bid/46598"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01001.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46598"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-4293

Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
    },
    {
      "lang": "es",
      "value": "El firmware Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 desde v2.30 hasta v2.51, cuando NAT esta activado, permite a atacantes remotos producir una denegaci\u00f3n de servicio (reinicio de sistema) a trav\u00e9s de paquetes GRE manipulados."
    }
  ],
  "id": "CVE-2009-4293",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-10T23:30:00.420",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/59361"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3111"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/59361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-4292

Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la funci\u00f3n de filtrado de URL en el firmware Internet Initiative Japan SEIL/X1, SEIL/X2, y SEIL/B1 desde la v2.40 hasta la v2.51 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar."
    }
  ],
  "id": "CVE-2009-4292",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-12-10T23:30:00.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/59362"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3111"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/59362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-2004 (GCVE-0-2014-2004)

Vulnerability from cvelistv5 – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01443.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN10724763/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.188Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01443.html"
          },
          {
            "name": "JVN#10724763",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
          },
          {
            "name": "JVNDB-2014-000055",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01443.html"
        },
        {
          "name": "JVN#10724763",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
        },
        {
          "name": "JVNDB-2014-000055",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-2004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01443.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01443.html"
            },
            {
              "name": "JVN#10724763",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
            },
            {
              "name": "JVNDB-2014-000055",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-2004",
    "datePublished": "2014-06-16T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4708 (GCVE-0-2013-4708)

Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01388.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN40079308/index.html third-party-advisoryx_refsource_JVN
http://osvdb.org/97619 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01388.html"
          },
          {
            "name": "JVN#40079308",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
          },
          {
            "name": "97619",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/97619"
          },
          {
            "name": "JVNDB-2013-000091",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T17:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01388.html"
        },
        {
          "name": "JVN#40079308",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
        },
        {
          "name": "97619",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/97619"
        },
        {
          "name": "JVNDB-2013-000091",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01388.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01388.html"
            },
            {
              "name": "JVN#40079308",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
            },
            {
              "name": "97619",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/97619"
            },
            {
              "name": "JVNDB-2013-000091",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4708",
    "datePublished": "2013-10-01T17:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-17T01:15:57.609Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4709 (GCVE-0-2013-4709)

Vulnerability from cvelistv5 – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN43152129/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01396.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#43152129",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01396.html"
          },
          {
            "name": "JVNDB-2013-000092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-20T15:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#43152129",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01396.html"
        },
        {
          "name": "JVNDB-2013-000092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#43152129",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01396.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01396.html"
            },
            {
              "name": "JVNDB-2013-000092",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4709",
    "datePublished": "2013-09-20T15:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:58:50.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4292 (GCVE-0-2009-4292)

Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jvn.jp/en/jp/JVN06362164/index.html third-party-advisoryx_refsource_JVN
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://www.seil.jp/seilseries/security/2009/a00669.php x_refsource_CONFIRM
http://osvdb.org/59362 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "seil-url-bo(54051)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
          },
          {
            "name": "JVN#06362164",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
          },
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "name": "JVNDB-2009-000069",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
          },
          {
            "name": "59362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59362"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "seil-url-bo(54051)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
        },
        {
          "name": "JVN#06362164",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
        },
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "name": "JVNDB-2009-000069",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
        },
        {
          "name": "59362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59362"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4292",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "seil-url-bo(54051)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
            },
            {
              "name": "JVN#06362164",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
            },
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "JVNDB-2009-000069",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
            },
            {
              "name": "59362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59362"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4292",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.216Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4293 (GCVE-0-2009-4293)

Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://www.seil.jp/seilseries/security/2009/a00674.php x_refsource_CONFIRM
http://osvdb.org/59361 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN13011682/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
          },
          {
            "name": "59361",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59361"
          },
          {
            "name": "JVNDB-2009-000070",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
          },
          {
            "name": "JVN#13011682",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
          },
          {
            "name": "seil-gre-dos(54050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
        },
        {
          "name": "59361",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59361"
        },
        {
          "name": "JVNDB-2009-000070",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
        },
        {
          "name": "JVN#13011682",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
        },
        {
          "name": "seil-gre-dos(54050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
            },
            {
              "name": "59361",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59361"
            },
            {
              "name": "JVNDB-2009-000070",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
            },
            {
              "name": "JVN#13011682",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
            },
            {
              "name": "seil-gre-dos(54050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4293",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2004 (GCVE-0-2014-2004)

Vulnerability from nvd – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01443.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN10724763/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.188Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01443.html"
          },
          {
            "name": "JVN#10724763",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
          },
          {
            "name": "JVNDB-2014-000055",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01443.html"
        },
        {
          "name": "JVN#10724763",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
        },
        {
          "name": "JVNDB-2014-000055",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-2004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01443.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01443.html"
            },
            {
              "name": "JVN#10724763",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
            },
            {
              "name": "JVNDB-2014-000055",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-2004",
    "datePublished": "2014-06-16T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4708 (GCVE-0-2013-4708)

Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01388.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN40079308/index.html third-party-advisoryx_refsource_JVN
http://osvdb.org/97619 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01388.html"
          },
          {
            "name": "JVN#40079308",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
          },
          {
            "name": "97619",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/97619"
          },
          {
            "name": "JVNDB-2013-000091",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T17:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01388.html"
        },
        {
          "name": "JVN#40079308",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
        },
        {
          "name": "97619",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/97619"
        },
        {
          "name": "JVNDB-2013-000091",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01388.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01388.html"
            },
            {
              "name": "JVN#40079308",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
            },
            {
              "name": "97619",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/97619"
            },
            {
              "name": "JVNDB-2013-000091",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4708",
    "datePublished": "2013-10-01T17:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-17T01:15:57.609Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4709 (GCVE-0-2013-4709)

Vulnerability from nvd – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN43152129/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01396.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#43152129",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01396.html"
          },
          {
            "name": "JVNDB-2013-000092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-20T15:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#43152129",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01396.html"
        },
        {
          "name": "JVNDB-2013-000092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#43152129",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01396.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01396.html"
            },
            {
              "name": "JVNDB-2013-000092",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4709",
    "datePublished": "2013-09-20T15:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:58:50.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from nvd – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4292 (GCVE-0-2009-4292)

Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jvn.jp/en/jp/JVN06362164/index.html third-party-advisoryx_refsource_JVN
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://www.seil.jp/seilseries/security/2009/a00669.php x_refsource_CONFIRM
http://osvdb.org/59362 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "seil-url-bo(54051)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
          },
          {
            "name": "JVN#06362164",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
          },
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "name": "JVNDB-2009-000069",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
          },
          {
            "name": "59362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59362"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "seil-url-bo(54051)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
        },
        {
          "name": "JVN#06362164",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
        },
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "name": "JVNDB-2009-000069",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
        },
        {
          "name": "59362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59362"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4292",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "seil-url-bo(54051)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
            },
            {
              "name": "JVN#06362164",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
            },
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "JVNDB-2009-000069",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
            },
            {
              "name": "59362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59362"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4292",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.216Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4293 (GCVE-0-2009-4293)

Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://www.seil.jp/seilseries/security/2009/a00674.php x_refsource_CONFIRM
http://osvdb.org/59361 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN13011682/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
          },
          {
            "name": "59361",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59361"
          },
          {
            "name": "JVNDB-2009-000070",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
          },
          {
            "name": "JVN#13011682",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
          },
          {
            "name": "seil-gre-dos(54050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
        },
        {
          "name": "59361",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59361"
        },
        {
          "name": "JVNDB-2009-000070",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
        },
        {
          "name": "JVN#13011682",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
        },
        {
          "name": "seil-gre-dos(54050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
            },
            {
              "name": "59361",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59361"
            },
            {
              "name": "JVNDB-2009-000070",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
            },
            {
              "name": "JVN#13011682",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
            },
            {
              "name": "seil-gre-dos(54050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4293",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}