Search criteria

6 vulnerabilities found for vigor167_firmware by draytek

FKIE_CVE-2023-47254

Vulnerability from fkie_nvd - Published: 2023-12-09 08:15 - Updated: 2024-11-21 08:30
Severity ?
Summary
An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface.
Impacted products
Vendor Product Version
draytek vigor167_firmware 5.2.2
draytek vigor167 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor167_firmware:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8ADA814-1612-48FD-BB70-B71D00CE3233",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A66A89-CF31-4C63-9562-707C03117104",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface."
    },
    {
      "lang": "es",
      "value": "Una inyecci\u00f3n de comando del sistema operativo en la interfaz CLI en DrayTek Vigor167 versi\u00f3n 5.2.2 permite a atacantes remotos ejecutar comandos arbitrarios del sistema y escalar privilegios a trav\u00e9s de cualquier cuenta creada dentro de la interfaz web."
    }
  ],
  "id": "CVE-2023-47254",
  "lastModified": "2024-11-21T08:30:03.703",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-09T08:15:06.787",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-33778

Vulnerability from fkie_nvd - Published: 2023-06-01 04:15 - Updated: 2025-01-09 18:15
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Impacted products
Vendor Product Version
draytek myvigor *
draytek vigorswitch_pq2200xb_firmware *
draytek vigorswitch_pq2200xb -
draytek vigorswitch_pq2121x_firmware *
draytek vigorswitch_pq2121x -
draytek vigorswitch_p2540xs_firmware *
draytek vigorswitch_p2540xs -
draytek vigorswitch_p2280x_firmware *
draytek vigorswitch_p2280x -
draytek vigorswitch_p2100_firmware *
draytek vigorswitch_p2100 -
draytek vigorswitch_q2200x_firmware *
draytek vigorswitch_q2200x -
draytek vigorswitch_q2121x_firmware *
draytek vigorswitch_q2121x -
draytek vigorswitch_g2540xs_firmware *
draytek vigorswitch_g2540xs -
draytek vigorswitch_g2280x_firmware *
draytek vigorswitch_g2280x -
draytek vigorswitch_g2121_firmware *
draytek vigorswitch_g2121 -
draytek vigorswitch_g2100_firmware *
draytek vigorswitch_g2100 -
draytek vigorswitch_fx2120_firmware *
draytek vigorswitch_fx2120 -
draytek vigorswitch_p1282_firmware *
draytek vigorswitch_p1282 -
draytek vigorswitch_g1282_firmware *
draytek vigorswitch_g1282 -
draytek vigorswitch_g1085_firmware *
draytek vigorswitch_g1085 -
draytek vigorswitch_g1080_firmware *
draytek vigorswitch_g1080 -
draytek vigorap_903_firmware *
draytek vigorap_903 -
draytek vigorap_912c_firmware *
draytek vigorap_912c -
draytek vigorap_918r_firmware *
draytek vigorap_918r -
draytek vigorap_1060c_firmware *
draytek vigorap_1060c -
draytek vigorap_906_firmware *
draytek vigorap_906 -
draytek vigorap_960c_firmware *
draytek vigorap_960c -
draytek vigorap_1000c_firmware *
draytek vigorap_1000c -
draytek vigor2766ac_firmware *
draytek vigor2766ac_firmware *
draytek vigor2766ac -
draytek vigor2766ax_firmware *
draytek vigor2766ax_firmware *
draytek vigor2766ax -
draytek vigor2766vac_firmware *
draytek vigor2766vac_firmware *
draytek vigor2766vac -
draytek vigor2765ax_firmware *
draytek vigor2765ax_firmware *
draytek vigor2765ax -
draytek vigor2765vac_firmware *
draytek vigor2765vac_firmware *
draytek vigor2765vac -
draytek vigor2765ac_firmware *
draytek vigor2765ac_firmware *
draytek vigor2765ac -
draytek vigor2763ac_firmware *
draytek vigor2763ac_firmware *
draytek vigor2763ac -
draytek vigor2620l_firmware *
draytek vigor2620l_firmware *
draytek vigor2620l -
draytek vigor2620ln_firmware *
draytek vigor2620ln_firmware *
draytek vigor2620ln -
draytek vigorlte_200n_firmware *
draytek vigorlte_200n_firmware *
draytek vigorlte_200n -
draytek vigor2915ac_firmware *
draytek vigor2915ac_firmware *
draytek vigor2915ac -
draytek vigor2135ac_firmware *
draytek vigor2135ac_firmware *
draytek vigor2135ac -
draytek vigor2135ax_firmware *
draytek vigor2135ax_firmware *
draytek vigor2135ax -
draytek vigor2135fvac_firmware *
draytek vigor2135fvac_firmware *
draytek vigor2135fvac -
draytek vigor2135vac_firmware *
draytek vigor2135vac_firmware *
draytek vigor2135vac -
draytek vigor2866ax_firmware *
draytek vigor2866ax_firmware *
draytek vigor2866ax -
draytek vigor2866ac_firmware *
draytek vigor2866ac_firmware *
draytek vigor2866ac -
draytek vigor2866vac_firmware *
draytek vigor2866vac_firmware *
draytek vigor2866vac -
draytek vigor2866l_firmware *
draytek vigor2866l_firmware *
draytek vigor2866l -
draytek vigor2866lac_firmware *
draytek vigor2866lac_firmware *
draytek vigor2866lac -
draytek vigor2865ac_firmware *
draytek vigor2865ac_firmware *
draytek vigor2865ac -
draytek vigor2865ax_firmware *
draytek vigor2865ax_firmware *
draytek vigor2865ax -
draytek vigor2865vac_firmware *
draytek vigor2865vac_firmware *
draytek vigor2865vac -
draytek vigor2865l_firmware *
draytek vigor2865l_firmware *
draytek vigor2865l -
draytek vigor2865lac_firmware *
draytek vigor2865lac_firmware *
draytek vigor2865lac -
draytek vigor2862n_firmware *
draytek vigor2862n_firmware *
draytek vigor2862n -
draytek vigor2862ac_firmware *
draytek vigor2862ac_firmware *
draytek vigor2862ac -
draytek vigor2862vac_firmware *
draytek vigor2862vac_firmware *
draytek vigor2862vac -
draytek vigor2862b_firmware *
draytek vigor2862b_firmware *
draytek vigor2862b -
draytek vigor2862bn_firmware *
draytek vigor2862bn_firmware *
draytek vigor2862bn -
draytek vigor2862l_firmware *
draytek vigor2862l_firmware *
draytek vigor2862l -
draytek vigor2862lac_firmware *
draytek vigor2862lac_firmware *
draytek vigor2862lac -
draytek vigor2862ln_firmware *
draytek vigor2862ln_firmware *
draytek vigor2862ln -
draytek vigor2832n_firmware *
draytek vigor2832n_firmware *
draytek vigor2832n -
draytek vigor2927ax_firmware *
draytek vigor2927ax_firmware *
draytek vigor2927ax -
draytek vigor2927ac_firmware *
draytek vigor2927ac_firmware *
draytek vigor2927ac -
draytek vigor2927vac_firmware *
draytek vigor2927vac_firmware *
draytek vigor2927vac -
draytek vigor2927f_firmware *
draytek vigor2927f_firmware *
draytek vigor2927f -
draytek vigor2927l_firmware *
draytek vigor2927l_firmware *
draytek vigor2927l -
draytek vigor2927lac_firmware *
draytek vigor2927lac_firmware *
draytek vigor2927lac -
draytek vigor2926_plus_firmware *
draytek vigor2926_plus_firmware *
draytek vigor2926_plus -
draytek vigor2962_firmware *
draytek vigor2962_firmware *
draytek vigor2962 -
draytek vigor1000b_firmware *
draytek vigor1000b_firmware *
draytek vigor1000b -
draytek vigor3910_firmware *
draytek vigor3910_firmware *
draytek vigor3910 -
draytek vigor165_firmware *
draytek vigor165_firmware *
draytek vigor165 -
draytek vigor166_firmware *
draytek vigor166_firmware *
draytek vigor166 -
draytek vigor130_firmware *
draytek vigor130_firmware *
draytek vigor130 -
draytek vigor167_firmware *
draytek vigor167_firmware *
draytek vigor167 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9A5891-1058-42FE-8D36-987E967D5481",
              "versionEndExcluding": "2.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A822A86-C784-4AED-B367-4D39609D93E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7AFBE0-9E98-4B46-9517-B73509F5944D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77DCACA0-BA44-4691-BAAD-828C54898FBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D6F173D-4339-4842-AC62-5E4C488D6067",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6602CA-744E-4543-9818-75FC57E83280",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAB8B117-8605-4C4E-990E-7DE09DF79738",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0604938-0253-466F-914D-300590C82AB1",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2E8256-45B6-4CDC-A2A8-60303773F149",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BABC689-A27B-43C3-B402-2CFF1AFF0012",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19676250-FC97-4476-9A26-304DC8E4B872",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF46332-4269-48FE-8D27-F0642FD08A75",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBFCBF8D-3FCA-4B17-9337-4BD621372F23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A90A385E-F817-42D4-BB1B-AF37DE3C9491",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3586D962-114E-4CD4-B6D2-8B031BBB01B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C04F98D-5668-4398-8D8B-4CE9340F20A1",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25451714-5AE6-43C7-B1CC-A2ED2486E402",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8724DACC-85AC-4047-8960-27FCF58C5BF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70A4480-2C9E-4662-8612-23F66A649BA7",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0983154F-C4BC-413F-B020-085E83D5BB44",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65373D8B-0DA8-4539-9E63-DBBDF493508E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "632A1555-3550-456B-8ED8-49E5929CE38E",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B400A32-0E46-4AAC-930F-D73A639C85DA",
              "versionEndExcluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2498876A-CDF4-423A-93C1-7337231D25E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FEC077-B0A0-4F87-A113-D0131946C358",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2052075-C2C4-4462-96B7-E3C448B81AD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05A02352-B3C3-4A92-822B-9B458CB03EAC",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "257B6270-8551-4E08-8A04-E8D575407EE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5783487-C7E1-4E14-B37F-EB4E5A68669B",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73D31F1-2CAA-4837-BC3D-FD4160873334",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5873909E-F741-4139-A29A-DF8D79CA330D",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8015A1DA-A1B4-4EBC-98AC-941583EF8E37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C369C7-16EA-42CC-9E96-9D868977B632",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E379F3EF-6789-4897-9B33-EAB954114571",
              "versionEndExcluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10586770-1426-435D-8137-2486A2843219",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8919EE4B-349B-435A-8E9C-A4C24504AF02",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF64120-5611-41D1-ADC0-2C8F4522A205",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC418D6-76FF-4208-B649-9650E572B750",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D1D724-D590-49FE-A301-C493FA4E50C3",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F653097B-9197-43A9-A9B4-8AA6EAFC5666",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D00C6D-2DCA-4737-9652-D576585ED712",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A582D29-85D9-4FC3-B88A-42B947B9D18C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47866545-C9BF-4FCA-ADCA-ED2E44FC4097",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "076A3429-8E00-419F-96D0-40917CEDC328",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37B22541-27CF-488D-A35B-6E8EB3FD1958",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9BF014-B8EA-4DD9-8320-627C3D276596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4290ACF-3E73-4C09-9001-6A2AC31BF719",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD1E5ED-6A96-4C4A-87D4-692988479D01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DA643A-7804-4058-963B-D4F9EF48D368",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4B71980-6D7A-4B7B-9863-E85CC849ED90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "743D7983-774E-43A2-8D9E-FD7ECFF49208",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00DC816E-1840-46F0-97C4-2BA00F5B9E64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4318B8A-B94C-4207-9731-76D35DE85034",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C5B846-1076-498A-9B18-E3AB9CA71664",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C37EA55-2526-4130-A57C-65950A5DFE57",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2933150F-1ACD-4CBB-AF76-52B0EF30D314",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24391FB-6E97-485C-A09E-BDEB991554A8",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE309C25-7405-43CA-84D9-D026995A2C1B",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4727DF-9C6B-451F-B0D8-97771723DB79",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E82803D-B1DE-4541-913C-9128B313AC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F53028-CD42-4B00-8E47-6E04ECCD7DB9",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1726990C-A56E-4FA3-A274-0059796DBD5D",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5295B4DF-DE6C-4725-A22B-1186D5AB1325",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D29250-F220-473C-B50D-CBEBCFF2FACC",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "315CA850-DA5C-46E8-90A1-457320A52AA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4D0323-BBDE-4770-956C-343C44C0963B",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C7A64C0-9FEF-4B90-B938-80B23AE31172",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4504923B-C903-432D-B4D2-287BD0145F3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27BC97E5-6000-4BB0-990A-63CC9EB7B464",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ECC2E3B-9D0A-4599-B183-A8D13486A07E",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "699735FA-D33E-4F32-9584-B15938FB954E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA84174C-4735-41D7-AED6-4628A00506CD",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "451A5CEC-8FE1-49AB-B196-BA644E6C6052",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C40B478-C28F-430A-A690-5EF9FFB4812E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F60FE9-4C8C-4987-BA4D-A013565C0276",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4F462E8-6427-4E42-902B-07E8A9366423",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCDD22F-A2FE-4A33-B577-E54434BCA715",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B87FA44-4931-4DC4-89BE-72A591C7C355",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F06ECA-134C-4C77-B347-17FCACB23AF1",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF8ECCA-405E-4D60-92ED-7F29F36A985F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "409F0831-39FC-406B-9F40-1A819D94E638",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB77A5C7-026C-4172-970A-28E0D1A6F2D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C59833-B82E-411B-8538-EABFE4F14E3A",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CF6DA5-1686-46B9-910D-A94DD63F08DC",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7469CB-2CDE-4D2D-988A-13A482A59B28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "153F7DFA-1B02-4DFB-8E1E-B651BD09F900",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F97B4A-B323-4354-9CAC-60BCB02A44DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D42814F5-C33D-43DF-A1B9-A993F7D65881",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C33DCB-487D-4CB4-A4C0-2C4B510AF422",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B57263-4900-4F2E-AA5C-554B5163F489",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F1AD94-F4F4-467A-A48F-AA4FD46D0191",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89BEEB-3F13-4C41-9133-788232DD229B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05478558-3571-47B6-865A-51C382710FFA",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78546B3A-97EB-4700-85EB-04CBED086A1C",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1ADB5D-D2CF-464B-9F1C-45F31A032953",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B44F218-4547-4011-B6DB-575CF501A872",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F85CD06-04CC-4A4E-A279-D110D966FAAF",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22E55C6-F71F-4EA7-B679-895A012B7020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1330489C-DFC4-4403-B656-E4CFFF0101E8",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "534F07F3-622A-4756-9C51-5403C12AA0D6",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C188F12-157F-4B8C-9A66-678B933E20F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22DC676-E8C6-4422-942E-55EB3535DB68",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B846175B-4DC0-4268-AAF2-F266BFD7646E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34386461-6500-4653-BF1B-5E5299D0E662",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD217200-9848-425F-B113-E624C027BC9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "150F7911-3FB3-429B-8974-7CD3D08A2109",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A09F00-EBA9-4D82-8CC6-99C36095EFB4",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE56943-366C-4D0E-8367-1E63C104F1D7",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B635143B-5C87-4A26-8E99-80D1061586C2",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9217655B-2A6A-457B-A72A-240DABD72ED8",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5ABFF7-F5DA-485F-976B-5C858B85E994",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AA22E6-35C2-4D7D-8521-315F1CF617E6",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1513AAB7-E518-4E71-A2C8-D677677F7284",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC3E2A0-797D-4512-98A5-4ACE48EF4225",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "523910EF-FEFF-410B-8256-C7C0CE39649F",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F61CB-714A-4855-AB07-7281E05D7F72",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26E65A66-EEC8-42B7-9787-F55339B70EBE",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E971141F-469A-499D-8F2A-20F8999240DC",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C66404FA-6FCE-43B7-8F3C-177FB740C39E",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "334E4F8A-B695-46A1-8362-4B97FE5CD424",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F167623-480E-49F3-869C-4CFD897AF696",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BB13341-7544-4459-B29F-D0F9BEE3001E",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7194998-2D96-43DE-85B6-35A8E474C695",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AEEDBE-5556-4358-A955-C4F30D969642",
              "versionEndExcluding": "3.9.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA97EBDF-8908-462A-807A-CDBA15AD5952",
              "versionEndExcluding": "4.2.4",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A66A89-CF31-4C63-9562-707C03117104",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
    }
  ],
  "id": "CVE-2023-33778",
  "lastModified": "2025-01-09T18:15:26.790",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-06-01T04:15:10.313",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

CVE-2023-47254 (GCVE-0-2023-47254)

Vulnerability from cvelistv5 – Published: 2023-12-09 00:00 – Updated: 2024-08-02 21:09
VLAI?
Summary
An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:09:36.048Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-09T07:12:17.381473",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt"
        },
        {
          "url": "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-47254",
    "datePublished": "2023-12-09T00:00:00",
    "dateReserved": "2023-11-05T00:00:00",
    "dateUpdated": "2024-08-02T21:09:36.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-33778 (GCVE-0-2023-33778)

Vulnerability from cvelistv5 – Published: 2023-06-01 00:00 – Updated: 2025-01-09 17:24
VLAI?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:47:06.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-33778",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-09T17:24:27.672008Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-798",
                "description": "CWE-798 Use of Hard-coded Credentials",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-09T17:24:35.184Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-01T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-33778",
    "datePublished": "2023-06-01T00:00:00",
    "dateReserved": "2023-05-22T00:00:00",
    "dateUpdated": "2025-01-09T17:24:35.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-47254 (GCVE-0-2023-47254)

Vulnerability from nvd – Published: 2023-12-09 00:00 – Updated: 2024-08-02 21:09
VLAI?
Summary
An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:09:36.048Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-09T07:12:17.381473",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt"
        },
        {
          "url": "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-47254",
    "datePublished": "2023-12-09T00:00:00",
    "dateReserved": "2023-11-05T00:00:00",
    "dateUpdated": "2024-08-02T21:09:36.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-33778 (GCVE-0-2023-33778)

Vulnerability from nvd – Published: 2023-06-01 00:00 – Updated: 2025-01-09 17:24
VLAI?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:47:06.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-33778",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-09T17:24:27.672008Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-798",
                "description": "CWE-798 Use of Hard-coded Credentials",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-09T17:24:35.184Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-01T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-33778",
    "datePublished": "2023-06-01T00:00:00",
    "dateReserved": "2023-05-22T00:00:00",
    "dateUpdated": "2025-01-09T17:24:35.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}