Search criteria
9 vulnerabilities found for vigor2862n_firmware by draytek
FKIE_CVE-2023-33778
Vulnerability from fkie_nvd - Published: 2023-06-01 04:15 - Updated: 2025-01-09 18:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:draytek:myvigor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9A5891-1058-42FE-8D36-987E967D5481",
"versionEndExcluding": "2.3.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_pq2200xb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB0DEE3-60C3-49F8-9A6C-47826AFF388D",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_pq2200xb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A822A86-C784-4AED-B367-4D39609D93E7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_pq2121x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35B88F62-BC7C-47AA-80F3-3BEDB0D5E5EA",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_pq2121x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB7AFBE0-9E98-4B46-9517-B73509F5944D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_p2540xs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FA6D7E6-EAD4-45E6-A1CB-4E5CF2543564",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_p2540xs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77DCACA0-BA44-4691-BAAD-828C54898FBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_p2280x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6F173D-4339-4842-AC62-5E4C488D6067",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_p2280x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6602CA-744E-4543-9818-75FC57E83280",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_p2100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAB8B117-8605-4C4E-990E-7DE09DF79738",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_p2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE4BB0C-0419-4A24-9C79-4642DBF22A9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_q2200x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0604938-0253-466F-914D-300590C82AB1",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_q2200x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC2E8256-45B6-4CDC-A2A8-60303773F149",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_q2121x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BABC689-A27B-43C3-B402-2CFF1AFF0012",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_q2121x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19676250-FC97-4476-9A26-304DC8E4B872",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g2540xs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF46332-4269-48FE-8D27-F0642FD08A75",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g2540xs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFCBF8D-3FCA-4B17-9337-4BD621372F23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g2280x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A90A385E-F817-42D4-BB1B-AF37DE3C9491",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g2280x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3586D962-114E-4CD4-B6D2-8B031BBB01B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g2121_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C04F98D-5668-4398-8D8B-4CE9340F20A1",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g2121:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25451714-5AE6-43C7-B1CC-A2ED2486E402",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g2100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F86A2C16-44BF-4C7F-A8C5-B03CEBC88CE8",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8724DACC-85AC-4047-8960-27FCF58C5BF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_fx2120_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D70A4480-2C9E-4662-8612-23F66A649BA7",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_fx2120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F9B1A57-A45D-4EA3-B76B-C0F6FEB92316",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_p1282_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0983154F-C4BC-413F-B020-085E83D5BB44",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_p1282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65373D8B-0DA8-4539-9E63-DBBDF493508E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g1282_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "632A1555-3550-456B-8ED8-49E5929CE38E",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g1282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8110E6A8-E30A-4D4B-9210-0FE5F9C0F27C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g1085_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3F580E9-2A0E-47E9-9C4B-2B971376C7EC",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g1085:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B61C56D2-6A25-4AF5-95E3-2AFE3E4A33F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorswitch_g1080_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B400A32-0E46-4AAC-930F-D73A639C85DA",
"versionEndExcluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorswitch_g1080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2498876A-CDF4-423A-93C1-7337231D25E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_903_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9BD0C4-5E5F-4E86-89F8-15821EC9618F",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D793F78F-1A6C-47AC-9F17-877DA0C6DD7D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_912c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13FEC077-B0A0-4F87-A113-D0131946C358",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2052075-C2C4-4462-96B7-E3C448B81AD7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_918r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05A02352-B3C3-4A92-822B-9B458CB03EAC",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "257B6270-8551-4E08-8A04-E8D575407EE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_1060c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5783487-C7E1-4E14-B37F-EB4E5A68669B",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_1060c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E73D31F1-2CAA-4837-BC3D-FD4160873334",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_906_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5873909E-F741-4139-A29A-DF8D79CA330D",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_906:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8015A1DA-A1B4-4EBC-98AC-941583EF8E37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_960c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79C369C7-16EA-42CC-9E96-9D868977B632",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_960c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0A4172-5FC4-4925-8BDD-A903FC31AFA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorap_1000c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E379F3EF-6789-4897-9B33-EAB954114571",
"versionEndExcluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E754E-F8F5-4E77-8ED1-BFA34C26C2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11182C9F-B2A1-4AE2-9983-6AC3DB8DE372",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10586770-1426-435D-8137-2486A2843219",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8919EE4B-349B-435A-8E9C-A4C24504AF02",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C23468E0-F84F-4FAD-8CA0-0A66E0C3D5C0",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF64120-5611-41D1-ADC0-2C8F4522A205",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFC418D6-76FF-4208-B649-9650E572B750",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68D1D724-D590-49FE-A301-C493FA4E50C3",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01E3E66C-815B-4DAE-9A38-DD8C583A4DF5",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F653097B-9197-43A9-A9B4-8AA6EAFC5666",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99D00C6D-2DCA-4737-9652-D576585ED712",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B0DC03-200A-4DE1-93C8-F46698E3C4B0",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A582D29-85D9-4FC3-B88A-42B947B9D18C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47866545-C9BF-4FCA-ADCA-ED2E44FC4097",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "076A3429-8E00-419F-96D0-40917CEDC328",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFF9F139-1975-4EE2-93E5-A22A1C9DEEA7",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37B22541-27CF-488D-A35B-6E8EB3FD1958",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9BF014-B8EA-4DD9-8320-627C3D276596",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BADF0105-D4FF-4F9C-A45F-86A1D29F0AF0",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4290ACF-3E73-4C09-9001-6A2AC31BF719",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DD1E5ED-6A96-4C4A-87D4-692988479D01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83DA643A-7804-4058-963B-D4F9EF48D368",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1285-F9C7-4F21-BA80-09EE9FD2BC61",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4B71980-6D7A-4B7B-9863-E85CC849ED90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67ABDDAF-CFA5-4185-B51C-8694FCF5ECAE",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "743D7983-774E-43A2-8D9E-FD7ECFF49208",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00DC816E-1840-46F0-97C4-2BA00F5B9E64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD7B44A-0421-471B-B777-2E1E4B6BC9E6",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05E71AD2-9353-48A0-8C5E-8CB0501E6CDF",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4318B8A-B94C-4207-9731-76D35DE85034",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7C5B846-1076-498A-9B18-E3AB9CA71664",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D23AC0A0-B4D4-4405-BA85-D3CEDC99254C",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D054B8D0-4B1E-4A04-A268-B9F5B2494E2A",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FBDE83D-0DC2-4265-8C13-6D67B8E551FB",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C37EA55-2526-4130-A57C-65950A5DFE57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6678CEE9-D55E-4BEB-9684-9E6A1275D7DA",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2933150F-1ACD-4CBB-AF76-52B0EF30D314",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "626A6BF5-0EA2-4B69-9FF9-95963A7BDC2E",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C24391FB-6E97-485C-A09E-BDEB991554A8",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE309C25-7405-43CA-84D9-D026995A2C1B",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4727DF-9C6B-451F-B0D8-97771723DB79",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7BC57D4-992C-4A15-9E0B-4A92DAB0E8FF",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E09C70BB-0404-44D2-BCA5-1A1ACF96DC81",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E82803D-B1DE-4541-913C-9128B313AC0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43F53028-CD42-4B00-8E47-6E04ECCD7DB9",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1726990C-A56E-4FA3-A274-0059796DBD5D",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5295B4DF-DE6C-4725-A22B-1186D5AB1325",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37EF7FFF-27D8-493F-AC08-CA08D8C68B9B",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45D29250-F220-473C-B50D-CBEBCFF2FACC",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "315CA850-DA5C-46E8-90A1-457320A52AA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4D0323-BBDE-4770-956C-343C44C0963B",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7A64C0-9FEF-4B90-B938-80B23AE31172",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4504923B-C903-432D-B4D2-287BD0145F3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27BC97E5-6000-4BB0-990A-63CC9EB7B464",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52037B3F-4CAA-4FF2-894F-D4C4F6F6EF34",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECC2E3B-9D0A-4599-B183-A8D13486A07E",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "662A9E6F-8D9E-4332-B3D2-5B364A7AEAB4",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699735FA-D33E-4F32-9584-B15938FB954E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA84174C-4735-41D7-AED6-4628A00506CD",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "451A5CEC-8FE1-49AB-B196-BA644E6C6052",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C40B478-C28F-430A-A690-5EF9FFB4812E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70A64A15-79FD-4C33-B0A2-6B5AB22E0A10",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F60FE9-4C8C-4987-BA4D-A013565C0276",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F462E8-6427-4E42-902B-07E8A9366423",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D930CFA9-2991-42D9-B34F-A33ECD1EB5A6",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCDD22F-A2FE-4A33-B577-E54434BCA715",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B87FA44-4931-4DC4-89BE-72A591C7C355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4000DB83-9F7E-4CF2-8BE4-620518BAE9B5",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F06ECA-134C-4C77-B347-17FCACB23AF1",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8ECCA-405E-4D60-92ED-7F29F36A985F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04D0B7F9-91E5-4C11-9E60-BEEFFA94A04A",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "409F0831-39FC-406B-9F40-1A819D94E638",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB77A5C7-026C-4172-970A-28E0D1A6F2D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60C59833-B82E-411B-8538-EABFE4F14E3A",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45BFE7A0-2AFE-47E9-B383-E4A46DEF8418",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81CF6DA5-1686-46B9-910D-A94DD63F08DC",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5F7C2B-C1BC-4E9A-99D0-F89F47EC597B",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7469CB-2CDE-4D2D-988A-13A482A59B28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29C38D34-5902-469F-BA3D-2C4F8D8A3CC6",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "153F7DFA-1B02-4DFB-8E1E-B651BD09F900",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60F97B4A-B323-4354-9CAC-60BCB02A44DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D42814F5-C33D-43DF-A1B9-A993F7D65881",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36C33DCB-487D-4CB4-A4C0-2C4B510AF422",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96B57263-4900-4F2E-AA5C-554B5163F489",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "650DC374-F23A-4FE1-9AA4-CC55DD5B88A0",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04F1AD94-F4F4-467A-A48F-AA4FD46D0191",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A89BEEB-3F13-4C41-9133-788232DD229B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05478558-3571-47B6-865A-51C382710FFA",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78546B3A-97EB-4700-85EB-04CBED086A1C",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1ADB5D-D2CF-464B-9F1C-45F31A032953",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B44F218-4547-4011-B6DB-575CF501A872",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F85CD06-04CC-4A4E-A279-D110D966FAAF",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22E55C6-F71F-4EA7-B679-895A012B7020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1330489C-DFC4-4403-B656-E4CFFF0101E8",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "534F07F3-622A-4756-9C51-5403C12AA0D6",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C188F12-157F-4B8C-9A66-678B933E20F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A22DC676-E8C6-4422-942E-55EB3535DB68",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D40DA2AE-0AAF-4DEB-8A07-91D7D15F90A4",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B846175B-4DC0-4268-AAF2-F266BFD7646E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5DC1B3-BB98-4178-AD67-FE3D3481D2CD",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34386461-6500-4653-BF1B-5E5299D0E662",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD217200-9848-425F-B113-E624C027BC9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "150F7911-3FB3-429B-8974-7CD3D08A2109",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23A09F00-EBA9-4D82-8CC6-99C36095EFB4",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D036F0-BF3A-43D1-AAF0-1F88F51FD58D",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADE56943-366C-4D0E-8367-1E63C104F1D7",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B635143B-5C87-4A26-8E99-80D1061586C2",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9217655B-2A6A-457B-A72A-240DABD72ED8",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ABFF7-F5DA-485F-976B-5C858B85E994",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AA22E6-35C2-4D7D-8521-315F1CF617E6",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2926_plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1513AAB7-E518-4E71-A2C8-D677677F7284",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC3E2A0-797D-4512-98A5-4ACE48EF4225",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "523910EF-FEFF-410B-8256-C7C0CE39649F",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E46B5A-D2B2-4ACA-B959-87B24CEAF5CA",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7F61CB-714A-4855-AB07-7281E05D7F72",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE33FDF-EABE-4A61-97B1-B12F5A2D0F1A",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26E65A66-EEC8-42B7-9787-F55339B70EBE",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E971141F-469A-499D-8F2A-20F8999240DC",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58FF72CC-49AB-4D1F-A972-FC98DCDDCF2B",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C66404FA-6FCE-43B7-8F3C-177FB740C39E",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "334E4F8A-B695-46A1-8362-4B97FE5CD424",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B649FFA-6D64-42A1-80A9-9B590EA8F5E3",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F167623-480E-49F3-869C-4CFD897AF696",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB13341-7544-4459-B29F-D0F9BEE3001E",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7194998-2D96-43DE-85B6-35A8E474C695",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23AEEDBE-5556-4358-A955-C4F30D969642",
"versionEndExcluding": "3.9.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:draytek:vigor167_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA97EBDF-8908-462A-807A-CDBA15AD5952",
"versionEndExcluding": "4.2.4",
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71A66A89-CF31-4C63-9562-707C03117104",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
}
],
"id": "CVE-2023-33778",
"lastModified": "2025-01-09T18:15:26.790",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-06-01T04:15:10.313",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-23313
Vulnerability from fkie_nvd - Published: 2023-03-03 22:15 - Updated: 2025-10-07 19:00
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C69AB3BE-7E50-4315-AB58-C33C49E8BB30",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C73DE-BFC6-4F3E-B022-559B3971CA44",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12F8DFDE-A5B0-44C2-ABAF-109058B56134",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "499BAE46-109A-4BD5-BFBD-9EB8FD824196",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860n-plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B678C-D666-4225-8756-727BFC699284",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860n-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896A175A-89F5-4120-A181-C300FE0C5DF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860vn-plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7D5E6C-F079-422F-B18F-22E8D82D37F5",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860vn-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFFB93AF-0BD9-499C-AC77-E5B78D2FF51C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C4E10B-0C86-4103-87C4-E9154014ECBD",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BED772E6-7A3B-44DA-B0AE-6EDB09C646B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "594D3E56-7A7C-4A17-8BE9-DC08C6AB2662",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "997B7B3F-F81A-4644-BB79-8DC79E6ADD0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C90047D4-532C-4B75-BACC-CBCC77F82361",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5437856D-50E6-497E-AE7E-15C3D8F2CD41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2860ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "178EE86C-DE2A-42EB-B27E-CC6615BB8618",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2860ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE2B9AA-B33E-4689-8765-56603FA3A5EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E9EBB3-C5D0-41DC-93F4-9BBCE183A1B0",
"versionEndExcluding": "3.9.6.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2832n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E3C1158-B7E0-4B14-ACB8-11C9D080C6E1",
"versionEndExcluding": "3.9.6.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2832n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22E55C6-F71F-4EA7-B679-895A012B7020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D205DD2E-3787-4345-BE2D-639E4576E4F2",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1405F9A0-3D26-4412-8ADE-FBAD8215A860",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3D0E87-A5A2-4828-A79D-DB10FE6BC4D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65B95391-36FA-43EB-BFB5-7F6E66FE2161",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95026A20-EB1B-49F4-ADBE-7CD3094C9E92",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FA8A23-F2A8-4EBE-ACEE-99C3879C8AC7",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "849F90B6-C7AE-437E-8A47-56A64C43EBD9",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F653097B-9197-43A9-A9B4-8AA6EAFC5666",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60411E51-9FE5-415F-A5A7-B392B69AFD4C",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765va_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DAF2A5-0129-42F3-9157-6D8CEA3B808F",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765va:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2C3E48-B40E-4E2D-BA7E-111FA3CC5ADA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2763_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA4A96F-598F-46F6-B634-E34683D72C34",
"versionEndExcluding": "4.4.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA9DF5D-6651-455A-9305-C42C0FF51F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2763ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB9FADB-2C06-40C9-A895-C5396F9B3BC0",
"versionEndExcluding": "4.4.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2763ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9BF014-B8EA-4DD9-8320-627C3D276596",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "247A0B24-5A88-42A1-A54E-566530CE599A",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE71C5B-EEE1-4903-96A2-47D2B318E6DA",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47B532B5-386F-4C4C-8554-C73409124306",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BC3CD7-1876-45FE-9BB2-37BE9CCC7D8C",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CEA5BFB-5D2F-44B2-B995-0675243264CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "125E3846-5419-474E-B6C7-D407239B43FD",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F97B07D-BC53-42A4-BBA3-D9CF5D474C9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED11EF06-B83B-410C-A2D1-0841CF25F61F",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4003BBE0-09BA-46D0-9683-3855E5F0AAD9",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C37EA55-2526-4130-A57C-65950A5DFE57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A16548F6-3D21-4875-B462-FDC5AF9A642A",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06507A17-10FC-42CF-A81B-DC5BA7575CFF",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D86329F8-FF42-4477-BE57-A0B25AAB5FBB",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "064DB573-532E-418B-BAED-78AA19B0CADA",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27258517-C97A-4A9E-AD0A-D27E49E7C39F",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F57E3F-8FFB-4A48-8BFD-5245D1EF2B80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F1039C4-B2E1-48E2-A177-372B6285C6D9",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "196CE92C-805E-4B6A-8EA8-7A49515FB617",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D3D2B2-8BD4-4654-A801-04E999CC28C8",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B81C46C-C837-4C10-AE7F-9E98A1A9E15C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A877CD3-16CA-4461-8D1B-A56E242B2B09",
"versionEndExcluding": "3.9.6.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1999AE2-3E6E-4D18-8FF1-D2A853B5975F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1ADA571-2AA2-46FC-8B0D-74E44C4AE4CF",
"versionEndExcluding": "4.2.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84121576-0E77-4CFB-9C9B-3ABCA7CAC0B8",
"versionEndExcluding": "4.2.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor130_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C20E7E09-4B2A-4134-B7AB-78EE38FB2001",
"versionEndExcluding": "3.8.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7194998-2D96-43DE-85B6-35A8E474C695",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigornic_132_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6062FBA9-6034-44E2-BD4F-1F06BDD291B2",
"versionEndExcluding": "3.8.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigornic_132:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B523DCD7-27FA-4376-BB96-A9C8CD39C4B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA540A-EAC4-4CB1-B447-6EEDEE59D3AB",
"versionEndExcluding": "4.3.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC9E78F-1295-4B45-A90F-39DDF290213F",
"versionEndExcluding": "3.9.7.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2B9784-5D14-4586-950E-8F3EE71258EF",
"versionEndExcluding": "4.3.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2962p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08830DB7-8638-4D71-A117-CF527D0BDD0A",
"versionEndExcluding": "4.3.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2962p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F44E9E-D6E6-44CB-A724-143EE7D74691",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF879ED-84FC-4EF0-B6D0-055AF51200A6",
"versionEndExcluding": "4.3.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B53E0D4-BE6D-400B-9BA8-206AD450D3F4",
"versionEndExcluding": "3.9.7.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2952p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A73B1BE-7704-40DB-BCD2-5CD33507F675",
"versionEndExcluding": "3.9.7.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2952p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00F421E8-00BE-4451-A948-0D9862E442E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91056A5C-E2B0-4080-9D63-D0FCD8262226",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AE75731-DD73-4A40-8C4E-1CC0143FFE84",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C188F12-157F-4B8C-9A66-678B933E20F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E146CFF-D5BA-4D24-B590-32F995ED9B84",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B846175B-4DC0-4268-AAF2-F266BFD7646E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE82FB7F-9EC3-4D07-AF77-4FF17B387303",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD217200-9848-425F-B113-E624C027BC9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "091C4285-5CB7-4CF3-908C-894635455E05",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5CF335-A5C0-46CC-A56C-0DBE15D01F0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "913E45FD-1360-4721-A314-EFD25BBEA638",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3239F8C4-451B-419C-844C-7A7B9D7FF1CE",
"versionEndExcluding": "4.4.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ABFF7-F5DA-485F-976B-5C858B85E994",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45A0D285-46C7-4589-8456-F952DC209E84",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF77E5E2-6C25-4E58-AE48-3570064F8690",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C04C85F3-C187-4F82-87A9-ECAF197ABA30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80490792-32DC-4472-9D87-84489C9F54B5",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65625316-A171-4C06-BFD0-C15A5ACF58A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A790737D-8EDB-4BA0-A381-BBE14887DB50",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "059842A3-553B-43A0-A714-15C55DA85752",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A11EB963-A1EE-4851-9406-A233820BC2A4",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "775E8858-B078-427D-BCB5-6D2B91D17A9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF6D4E27-E17F-4DF3-A26D-576B407E567F",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E30F255-ECE9-4E6F-9A22-2826E548C18B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8FC0332-69A8-4097-B904-1A7EBAEC5E1F",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4953A99-AD72-4204-BAA9-D87164349E01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00893432-0C77-4B19-81A8-AB893AFFAF63",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7536B29C-2030-4331-B8BF-D269D86D199B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B9C17-5233-42E5-A1FB-07911BD4D677",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB816A0-B3F2-4C49-AAFF-5099AD5F2036",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925n-plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31B69B27-9F78-4B93-A597-69EB905BC164",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925n-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8940245-090F-40AF-A0F5-F56AC2DDCE9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925vn-plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF45D40A-489C-4B61-9BB2-C9704EA55025",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925vn-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "216C7078-B72E-46B4-A039-6D3331A5AA13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67A71E52-14C8-42B8-886A-6E919A57EF58",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2AA7A61-2672-425D-89D0-4BE755FA6BFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64B25C71-51AB-4467-BE30-608E7DB4C73F",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C0AA77-8B78-425A-B9E8-078B79C4AC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925fn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "110FD744-1E76-4653-B305-6B8ACD9D518C",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925fn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4DE43C-8CE1-4DF4-B648-106E1A61C89B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "761348BA-8EAA-417F-9307-012B24175D7B",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6E46A7-46DB-4EAE-8833-9F31B78A86AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2925ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581777B9-1CBF-4411-AB0B-B07085A7B798",
"versionEndExcluding": "3.9.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2925ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "786D2F19-0E84-4742-ACC6-2067F33CE89C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1250B6A3-321B-4364-9A16-7A488904F38B",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D96FE337-9A49-4BED-8664-0E3F0D9D29BB",
"versionEndExcluding": "4.4.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4318B8A-B94C-4207-9731-76D35DE85034",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90CD3735-6EA7-409E-BD92-8953EE02EAB1",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6251A2-FC48-4D39-9DEF-8C788B1A85C8",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8864B388-393D-4E13-958B-25A1E242A90E",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E82803D-B1DE-4541-913C-9128B313AC0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CD208FE-5FBF-41F5-81C7-E4F0540A4AAB",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5295B4DF-DE6C-4725-A22B-1186D5AB1325",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFE805D-2693-4368-B364-B199ABBD838F",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "315CA850-DA5C-46E8-90A1-457320A52AA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "717D6ECA-661C-41A1-8B00-728D19B1C762",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4504923B-C903-432D-B4D2-287BD0145F3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7181501C-950D-4786-BAB3-22E01FF8E75F",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF16212E-83F5-46C0-946B-EBAD2A65B347",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699735FA-D33E-4F32-9584-B15938FB954E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1740C22B-3BC2-4005-A1DD-43EC6A28E38F",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "202C399F-C2D0-448A-A79B-9425A72C40AC",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C40B478-C28F-430A-A690-5EF9FFB4812E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB198159-97A7-484E-A28D-700E180E4402",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F462E8-6427-4E42-902B-07E8A9366423",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D94FF40D-B31F-4A75-BCC5-C1390CFE5832",
"versionEndExcluding": "4.4.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B87FA44-4931-4DC4-89BE-72A591C7C355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CCFB9E-4CAA-4C14-9DF2-926A219E9BA4",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93A67B50-D7F4-4DF2-B4DF-96674A6A1339",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8ECCA-405E-4D60-92ED-7F29F36A985F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0612E16B-5478-44B0-BB32-7646455E85A9",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB77A5C7-026C-4172-970A-28E0D1A6F2D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC43F79E-C983-4497-B0F2-B237DA41EF8C",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9545545-8CE4-4677-ADC1-8DFE4A892FE6",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7469CB-2CDE-4D2D-988A-13A482A59B28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "838B633F-CD17-4D0F-964B-51AB05D2F608",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60F97B4A-B323-4354-9CAC-60BCB02A44DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C63839A-D768-4C31-85D8-2A94C0E75DF2",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96B57263-4900-4F2E-AA5C-554B5163F489",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "329E2BCC-460F-4841-984E-960EFA5940A5",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1ADB5D-D2CF-464B-9F1C-45F31A032953",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D483171-44CC-4C4C-93C4-E8D022660C30",
"versionEndExcluding": "3.9.9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A89BEEB-3F13-4C41-9133-788232DD229B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router\u0027s web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2."
}
],
"id": "CVE-2023-23313",
"lastModified": "2025-10-07T19:00:07.737",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-03-03T22:15:09.690",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-32548
Vulnerability from fkie_nvd - Published: 2022-08-29 06:15 - Updated: 2024-11-21 07:06
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B937B768-C53B-490F-B6A8-6B0A2CC6C05A",
"versionEndExcluding": "4.3.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05E81F44-7E9B-406E-BB4F-A3B6E5B82316",
"versionEndExcluding": "4.3.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF86645-253A-4BA3-BA2A-2725575C390D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13C4AF21-4B66-4A84-95FB-268F8B644B39",
"versionEndExcluding": "4.3.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0C9A21-7CFE-452F-8505-834AB8579D9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2962p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17AD71DA-3550-4C1F-B2D6-BE8521E8A86C",
"versionEndExcluding": "4.3.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2962p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F44E9E-D6E6-44CB-A724-143EE7D74691",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "411D132F-5340-4EFF-AC02-CF4AAB9320F4",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12460F51-25AB-4EA9-BC43-9CE8DA992D75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "070AFC36-DFCF-4511-9B72-BCC5E37F5A21",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C188F12-157F-4B8C-9A66-678B933E20F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63F379DA-0262-438F-9689-1D7824257A3A",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B846175B-4DC0-4268-AAF2-F266BFD7646E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E695FA8-7DC9-483B-89BC-9A55AA69C500",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD217200-9848-425F-B113-E624C027BC9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE83225-B91F-4A39-B3C9-35551B85A61C",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9D70E8-080B-4F0E-BA3A-ACFE8F61475B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AB34C6-A18C-425F-BC75-E4729FDBA462",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ABFF7-F5DA-485F-976B-5C858B85E994",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD74FED6-4AC0-4BB8-A32D-D849350968B0",
"versionEndExcluding": "4.3.3.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5860CBE4-328E-418D-9E81-1D3AF7DB8F2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8DBA39-B28F-4901-860E-DE550A8FADA9",
"versionEndExcluding": "4.3.3.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4318B8A-B94C-4207-9731-76D35DE85034",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3BC6B8-6B4C-4794-9394-479DF40C7F5A",
"versionEndExcluding": "3.9.7.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167336E2-AAA8-4424-AB07-2D7C9E1542B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2952p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF2DE13B-8494-4E98-B18A-2EA35D9A7650",
"versionEndExcluding": "3.9.7.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2952p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00F421E8-00BE-4451-A948-0D9862E442E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0996CFA6-AA5C-4EFD-BD9E-1B0F23F03804",
"versionEndExcluding": "3.9.7.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64955940-3998-4B76-92D1-D9F3FAB874B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76E680BF-6C82-4691-92DA-D4F50E4120BB",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1B117B-603D-493C-A804-C18ED332A221",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66C1DB0D-3F7F-4EF5-9F23-10AC94B4A439",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C04C85F3-C187-4F82-87A9-ECAF197ABA30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "957D95D2-3569-4CA0-9C05-279F32B66F44",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65625316-A171-4C06-BFD0-C15A5ACF58A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82DF224C-6CE9-43FF-A882-0C3989018D00",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "059842A3-553B-43A0-A714-15C55DA85752",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE43891-7DB2-4C48-97B7-9F1F3051EA7D",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "775E8858-B078-427D-BCB5-6D2B91D17A9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1498B13D-10BA-49D2-8229-ADFCA5F44B20",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E30F255-ECE9-4E6F-9A22-2826E548C18B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2926lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB36D6A-658F-4A67-BC7F-045C44A3A322",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2926lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4953A99-AD72-4204-BAA9-D87164349E01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "943EEFDB-8958-41BA-84E7-BB28A218B245",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B01EDAE-BB9E-4431-BE8C-6505BA7CA42D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E63AB9A5-C5AE-410E-AFA3-D32F69887D9E",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8ECCA-405E-4D60-92ED-7F29F36A985F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4982251-F1DE-46CF-8995-F9B0CAD4D758",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB77A5C7-026C-4172-970A-28E0D1A6F2D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0622A4B6-8839-4972-AC2A-1634F4241B9A",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB96DDC-9961-47D4-81DF-4117A1B9C8F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "932AA150-DCEE-4313-92E3-B9AECBD6707B",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7469CB-2CDE-4D2D-988A-13A482A59B28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A808791A-0863-44F6-8A13-8EFF8EB8C727",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60F97B4A-B323-4354-9CAC-60BCB02A44DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "137281B3-B1F6-4EC4-BB8B-8652533E2337",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96B57263-4900-4F2E-AA5C-554B5163F489",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF2D8790-A2EE-4AE1-A2DC-CC54108DD263",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1ADB5D-D2CF-464B-9F1C-45F31A032953",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5972D23-8225-48C1-B9A5-F63531B548E1",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A89BEEB-3F13-4C41-9133-788232DD229B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D38C4B52-81DF-40F2-8760-A25915126158",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DD1E5ED-6A96-4C4A-87D4-692988479D01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDA1B3E-4B46-451B-9462-6BBFF5A16F28",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4B71980-6D7A-4B7B-9863-E85CC849ED90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99B65954-02D6-4B76-88F2-5787B1A55729",
"versionEndExcluding": "3.9.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00DC816E-1840-46F0-97C4-2BA00F5B9E64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7646BDD0-992E-43D6-A5A9-AB5EA5E89FD3",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1878E59C-FB40-435D-940A-8952C56FA88B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55C8D979-63A8-419F-86CB-CFDBE8C19B2D",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F57E3F-8FFB-4A48-8BFD-5245D1EF2B80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03D383A7-C3A8-41E8-8731-04EF97F0CCE1",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "196CE92C-805E-4B6A-8EA8-7A49515FB617",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "297393CA-8855-46DD-A229-D46BA338A57C",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B81C46C-C837-4C10-AE7F-9E98A1A9E15C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56923C0D-7FBF-4110-8220-07D2FFEA30A6",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1999AE2-3E6E-4D18-8FF1-D2A853B5975F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61F5E418-BA97-4F40-B3E6-AE256FE0EFDD",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3873B2B9-95C1-4F00-9165-7C4D2A90CDE5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C44183E5-3030-45F1-BE3E-EAA47312E6AB",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47B532B5-386F-4C4C-8554-C73409124306",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E41A4B2-4C20-433F-9285-95909A0AEE3B",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CEA5BFB-5D2F-44B2-B995-0675243264CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67A1CBE5-09BF-47A6-A6CA-5FF5CEF6670F",
"versionEndExcluding": "3.9.6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F97B07D-BC53-42A4-BBA3-D9CF5D474C9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71348479-95FE-4E66-A068-74DA89C82F6F",
"versionEndExcluding": "4.2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E644893-0457-43A9-98AB-9DB37A5C415C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFE35F98-0304-415F-B8AF-93C17F8DA6CB",
"versionEndExcluding": "4.2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E33E647-5883-44FA-9915-34B89090D4E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0394013-3F27-4ACA-81C1-17399631DF84",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDC8A7F-08CF-44D2-A9A5-A1353AF35B45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1355BCF1-FB23-45B9-9201-EA25B2F33920",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D227B7-1121-4657-A621-AF0C0E766D90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBDB62F3-082E-4763-BAA0-69B78DA16B5C",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC1C9BE-31B5-47DD-BE09-0984EE29A957",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3327574-E0DB-4CB4-8BDD-C03F09D0974A",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625DE418-F506-4579-9C25-04DCD0FBC7ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D431985C-61B3-4124-A363-3124D1AAF5CC",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60657812-D3A8-4B1B-B7BE-F629991CB053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB6111E-2063-4CCF-8E50-4E851264FB16",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B9AF22-089B-41FB-8E30-BED3E4CE32ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F63944F3-F3D4-4240-819F-15694FB71C1D",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A582D29-85D9-4FC3-B88A-42B947B9D18C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C34C4A04-A6D0-48F9-BDB0-26847CC0EBAE",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB3C84-67CA-4531-85FB-1A56F3C93ABF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA939906-239F-40DC-B452-8FF64C9907C7",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "787134FE-0549-427D-A9CE-32B1C58BC954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E78CBAA-2D96-43C8-84A1-AF6CB42C8131",
"versionEndExcluding": "4.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228DC583-B6BC-4948-A167-53C49B6D04B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0928E933-244C-44E7-A7B3-C6009DD12EC2",
"versionEndExcluding": "3.9.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0978465-D59F-4C0A-A29F-5D7BE58BA557",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98F02BBA-DADE-48C9-8802-6C170714A3DF",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "871448C6-9183-4828-A287-05F5EC6A44F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57E1D55A-45D7-4427-8BF4-197853948E37",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699735FA-D33E-4F32-9584-B15938FB954E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8F3B5B-F074-4AB1-8F2C-D4680A843781",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D62A63-1E53-469C-B06C-DB6D05C7BE2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63B4931B-4B4E-4F30-9A53-657746F3AEEF",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C40B478-C28F-430A-A690-5EF9FFB4812E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA4AF52-76AE-4356-94DD-2033D888ED32",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F462E8-6427-4E42-902B-07E8A9366423",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14488AE9-7FDB-466C-A7BF-3DF43F4A9FE6",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B87FA44-4931-4DC4-89BE-72A591C7C355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05E1101F-BFCE-479F-9E3C-932D56E42C9A",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0D2760-739F-4C79-AEDC-8B2CCCA2FF53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD98A315-7484-442B-A411-CDFCDDDCC625",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F84DE3D-5FFD-4D6F-877A-A656287BDD7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E30E7C6-C4F5-46C4-87F7-E64AD8CA1DAB",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E82803D-B1DE-4541-913C-9128B313AC0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51C16598-52C3-4302-B2EF-4714007904D5",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5295B4DF-DE6C-4725-A22B-1186D5AB1325",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F93460D-E72A-4F55-8471-476BD86B83BD",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "315CA850-DA5C-46E8-90A1-457320A52AA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "962FC4B2-E7AE-4F4F-B6F5-7E71C9EDFFF6",
"versionEndExcluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4504923B-C903-432D-B4D2-287BD0145F3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field."
},
{
"lang": "es",
"value": "Se ha detectado un problema en determinados routers DrayTek Vigor versiones anteriores a julio de 2022, como el Vigor3910 versiones anteriores a 4.3.1.1. El archivo /cgi-bin/wlogin.cgi presenta un desbordamiento de b\u00fafer por medio del nombre de usuario o contrase\u00f1a al campo aa o ab"
}
],
"id": "CVE-2022-32548",
"lastModified": "2024-11-21T07:06:36.290",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-29T06:15:09.423",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-33778 (GCVE-0-2023-33778)
Vulnerability from cvelistv5 – Published: 2023-06-01 00:00 – Updated: 2025-01-09 17:24
VLAI?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:47:06.496Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-33778",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-09T17:24:27.672008Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798 Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-09T17:24:35.184Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-01T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-33778",
"datePublished": "2023-06-01T00:00:00",
"dateReserved": "2023-05-22T00:00:00",
"dateUpdated": "2025-01-09T17:24:35.184Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-23313 (GCVE-0-2023-23313)
Vulnerability from cvelistv5 – Published: 2023-03-03 00:00 – Updated: 2025-03-07 16:33
VLAI?
Summary
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
Severity ?
6.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:28:40.675Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-23313",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-07T16:32:55.557112Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-07T16:33:57.302Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router\u0027s web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-19T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-23313",
"datePublished": "2023-03-03T00:00:00.000Z",
"dateReserved": "2023-01-11T00:00:00.000Z",
"dateUpdated": "2025-03-07T16:33:57.302Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-32548 (GCVE-0-2022-32548)
Vulnerability from cvelistv5 – Published: 2022-08-29 05:38 – Updated: 2024-08-03 07:46
VLAI?
Summary
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
Severity ?
10 (Critical)
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:46:43.481Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-29T05:38:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-32548",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers",
"refsource": "MISC",
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"name": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html",
"refsource": "MISC",
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-32548",
"datePublished": "2022-08-29T05:38:35",
"dateReserved": "2022-06-08T00:00:00",
"dateUpdated": "2024-08-03T07:46:43.481Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-33778 (GCVE-0-2023-33778)
Vulnerability from nvd – Published: 2023-06-01 00:00 – Updated: 2025-01-09 17:24
VLAI?
Summary
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:47:06.496Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-33778",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-09T17:24:27.672008Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798 Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-09T17:24:35.184Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-01T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-33778",
"datePublished": "2023-06-01T00:00:00",
"dateReserved": "2023-05-22T00:00:00",
"dateUpdated": "2025-01-09T17:24:35.184Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-23313 (GCVE-0-2023-23313)
Vulnerability from nvd – Published: 2023-03-03 00:00 – Updated: 2025-03-07 16:33
VLAI?
Summary
Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router's web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2.
Severity ?
6.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:28:40.675Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-23313",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-07T16:32:55.557112Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-07T16:33:57.302Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain Draytek products are vulnerable to Cross Site Scripting (XSS) via the wlogin.cgi script and user_login.cgi script of the router\u0027s web application management portal. This affects Vigor3910, Vigor1000B, Vigor2962 v4.3.2.1; Vigor2865 and Vigor2866 v4.4.1.0; Vigor2927 v4.4.2.2; and Vigor2915, Vigor2765, Vigor2766, Vigor2135 v4.4.2.0; Vigor2763 v4.4.2.1; Vigor2862 and Vigor2926 v3.9.9.0; Vigor2925 v3.9.3; Vigor2952 and Vigor3220 v3.9.7.3; Vigor2133 and Vigor2762 v3.9.6.4; and Vigor2832 v3.9.6.2."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-19T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.draytek.com/about/security-advisory/cross-site-scripting-vulnerability-%28cve-2023-23313%29/"
},
{
"url": "https://www.horizonconsulting.com/advisories23-Multiple-XSS-Stored-in-DrayTek-routers-CVE-2023-23313"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-23313",
"datePublished": "2023-03-03T00:00:00.000Z",
"dateReserved": "2023-01-11T00:00:00.000Z",
"dateUpdated": "2025-03-07T16:33:57.302Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-32548 (GCVE-0-2022-32548)
Vulnerability from nvd – Published: 2022-08-29 05:38 – Updated: 2024-08-03 07:46
VLAI?
Summary
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
Severity ?
10 (Critical)
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:46:43.481Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-29T05:38:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-32548",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers",
"refsource": "MISC",
"url": "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"
},
{
"name": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html",
"refsource": "MISC",
"url": "https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/rce-in-dratyek-routers.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-32548",
"datePublished": "2022-08-29T05:38:35",
"dateReserved": "2022-06-08T00:00:00",
"dateUpdated": "2024-08-03T07:46:43.481Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}