CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43F0BE07-FC42-4AB1-A553-1B254CC57D4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DADC38F-D530-49FC-A834-3BBC5FF71C27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F76EDD89-9C58-40BE-B7AE-72E82D051641\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CA0DBD0-9181-45DB-83AB-74B63C4644DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"488614FD-E4DF-4E6B-B928-444D98076F4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6A638B5-5FBC-4193-879D-883CF2777200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCE84A44-AAB5-4D3F-ADE5-617E58B14E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"507272EC-6B90-46DA-9E9A-EF5DCB770E7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C74FA35-319D-4B10-868A-A6CFAD137978\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71B53A2B-FF57-42B1-957B-E01CC8DE087B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C0D8323-9921-415C-B47C-49A947068F68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEBE6E5A-691F-46EF-B999-18ED949BF2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11181F82-4A35-43AD-838E-E07092DF8652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD9E04C4-EA46-4F14-A60B-12CAD9E98485\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1108097E-7B13-41A8-A6FC-0F958BFEB94F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB61B92-399A-45AD-A2EB-886F01DE57D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0928B5-60AB-4F2B-BF12-EEFF0CC38CD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30C0244F-E26B-45E6-A14F-0482B22C4E8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D4FF3BD-1659-4582-AF3E-385829001579\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2F107CD-7985-4529-B9CB-F15C9EE80975\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C947580-1489-4B27-A740-1A5853170E89\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/b1:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BE3BBD4-FB2E-4543-9149-0452B26FAC31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2D29BB-DAEC-4D24-AA79-E7F136D37B0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B23BF51-78E0-46B7-8288-16EB6C1D210C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"953C86E4-3E0F-4A75-BD27-EF8BE4F48894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3D7717A-A3E4-45A8-A774-3C2855267FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7500641-D607-4221-ADA2-CBCC338F22A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21A290E5-32F5-42AE-BDE8-C92B84A44D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35BC7F97-3208-43EE-B931-A28CD9A3515F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C03EE30-DC89-4926-A1FF-F878B4F9E205\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90546F95-8BA1-4F13-86F4-91F797528281\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9A47FE3-A7E3-41FF-81B2-A41CCB776924\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B75E486-B21A-4155-A4F8-155CD3A2EB59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10BC7EF-5A3B-4026-9EDA-15061EBF814E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23564CCD-7EF3-4457-99FB-BFE966D35D5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD52B307-EA12-48FC-ACD5-01AEDED44A5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F1D4E9-40BB-4BA6-9C44-5E06C8D98291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF6EC374-64D2-4990-A4C4-86529CCF27C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAAA887F-7944-4C31-A191-0A39BC4E6544\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35A5F2AA-23C4-43D4-B355-A9971503E3DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EA78DB-5273-48F5-9350-EABAEE8FD79A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E805B146-572E-466E-BF0B-6B53970A72EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86AAEE2F-8D63-4167-A6C8-DAD2F235015D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C83696CE-91F3-4559-B16A-D1CF1C915515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF4C61B-393E-44E4-9404-BC331C8E8729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF4E913E-1E8D-439B-8B77-35A54E42EC98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75C2643-7F2A-4C34-94A0-DCB60399EF07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B8E0B95-CFD0-4501-B98E-FC05113F7022\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F916DA4-79A9-4523-907C-812E3FDF69FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD9E82EF-2A12-4A7F-8559-D8D2147FB74D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADEE64C1-72A3-42FF-A13F-7F3E5F41F53B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDC574B6-B448-4A51-B5A0-2F521205D4DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71A0080D-3532-46E2-AC7D-F3E3E73622D4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/x1:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A63E557-3BA6-4E0E-8597-BAA112B21DEF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59204C16-8DC1-4BA0-9F73-560CC6D0E37B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A420F017-83DC-4029-A0F8-F50ED600CEA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2923D4A5-FD10-4846-B2F5-93C64DEB081E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D07EB84-D033-423B-AD53-D7B47DC508C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB31A5D1-6219-4E7D-965A-65C885C71C62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4383E0DF-E0D2-4E59-8053-CFD57F4C11C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25B9C033-965D-420F-8F71-C650592D5AE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CCB5982-5ECF-471C-8731-59AB4784055F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF907907-1E85-4F85-84ED-0DB73466186F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"429DBDFD-C32D-4888-BC36-FCE5896FC963\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4C47A3C-D478-44E9-8183-735CF9CFBC2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"416DCB14-271A-4578-9AE7-418C75ADC4C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEBFCE3F-FE95-4559-A972-5241D48CB902\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0064F721-57E1-4AC4-A3C3-92E05B64F0F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED8A76A3-9CD8-4A3C-BDD4-53407A92E527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"509DC30B-7D2F-43A7-9FD3-71FC405F520E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809E64CE-504D-49BB-8C76-09D95F814893\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FC22870-8A4A-483E-AA38-325E1564E4AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07952D84-10F6-46D0-B896-89401F063888\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BB8C1C6-D47D-4A85-8997-9E356688DA24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07AB01A2-0CC3-49E6-B1A1-FF1BD918019E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38FA01CD-625E-4DE4-8898-725AF4D8D2B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88B39BDF-A579-4C67-98E8-C017F426076C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6285D504-1960-42B4-8F7B-1AEDEB9AE865\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F9FFA1-A224-473B-9827-7F5F40A20837\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3F86FC7-A7B2-4A58-9CDA-3056CE4C9AD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35160F7C-5804-4A43-96F8-31456EED7DDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"486D5372-371D-4E43-B2AA-2E7236C8BDB0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/x2:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x86_firmware:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73301872-EFC2-4E08-B166-ECBBEC6DB310\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x86_firmware:1.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0C2C21D-8DEA-4BD4-B116-875DAF8F9AB7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/x86:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"477E1688-0CA2-4BD0-A29C-3239B760FA3C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.80:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB84E030-ADCF-4A17-878C-BE6FD000DA18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D157BDC2-5ABA-4B94-B497-7814656FB4DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.82:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A57A7B71-F867-4229-96C5-F92DA246965D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF8B532D-A45C-4111-A251-2BD9130DA95A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.84:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F235CD04-35C6-4682-A106-843CF8E46110\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.85:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4A112F5-13F8-462E-87CF-AB2CC460CEF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AF5549D-33D5-420A-9B3E-6DF9312C4E4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37B08D35-81CD-40C1-B2D9-84D6E59CF0C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A60CE6E6-9534-449B-A94A-BEBA13098168\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.93:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11E4367A-457C-4B7F-9BE8-53E3D2B49619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.94:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BA6C92F-E66D-452C-9270-6DFC4D7F1F4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.95:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F116BC45-BE30-4792-9608-EFB81C98474D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.96:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FE8DDF0-7669-45BD-820C-81FC8E13155F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.98:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"601CA34B-CAC4-4ED9-8ACB-5A33CC094043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.99:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D045157-F49D-43B5-B72E-21E04169F6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F74F4DE-5345-4143-8491-E7309E382F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A875FD5-EB5C-4656-AB9D-18C4B8292603\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B674EC4-814A-47FD-AA07-F2771A69E8FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3472F4F-8EB5-4FB1-A4D8-906C12881A19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37EF3613-AC50-4247-944C-C458665586EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0956BF1C-0002-496A-A016-6EB39241A6BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E1F0CCF-9850-4947-AB9B-B6B1F9B062D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF1465E3-0262-4D2F-BE9F-283975E2333A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3165577-0B87-432C-9358-0AABDC43962F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.09:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"218A23E8-73D4-455C-9394-6815393FF16D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96AD6D79-11A9-495B-A2B5-72FB4F038285\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/turbo:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC88F5F6-CB51-4676-91D6-69668229E675\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8670AD0-35C3-4438-A181-7521EC847A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DC07A9F-315F-4568-BFE8-F0059DE1F9CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"940393EB-8F83-4F7C-89B3-ACD8408DB042\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7020FE3C-4828-4A93-AB2A-468E560D8B5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"453CDEAE-AC98-43E0-A911-81851218627C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65AB86F2-B376-485F-B5B0-320F6ADA07BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C827210B-2416-4359-9332-E90FF4F21677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E12BA97C-1DCB-46D2-B0CB-1ACE81075706\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E77F9AD8-D3A9-4F54-9FE4-92BBD2F46AD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EA6A477-7672-47EB-B87C-E1C6AAF50F31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88FE1585-45C4-429F-928A-C046ABCA9017\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADA2BCF0-C05B-41C5-96B5-C95DD436F8D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1869AC1F-51B0-4526-8EDA-DEF06C367451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CF07485-398B-47D4-862A-95F7E5E290E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EE93F86-E9A8-4998-BBF3-FF7EDD77B97C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69D2A024-111B-4277-8C98-65A68D08EBD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38F6905E-F264-4646-A242-6594431F14A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0773B6A6-ABAD-44A6-B603-8223A6DFBB19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E78806-7F68-4544-ADAE-C406320BE9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D036A01-44D0-4765-9A9A-FF85AF6F2288\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"606B52C7-1B72-457E-88F8-F640D9680561\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1171554F-CD60-4828-B09F-067F15970A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D887445-7CD6-4F2A-BC42-CF695A68269E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41F891F4-BB36-4B92-B87D-261CECA4DD15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE2696E1-2EE9-4020-857A-2F548FB61D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87A0AD7B-23AC-4292-9572-1C3574327C95\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/neu_2fe_plus:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFB4A421-197B-4654-B362-AEDA3ADADC33\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de buffer en el concentrador de acceso PPP (\\\"PPP Access Concentrator\\\" o PPPAC) en SEIL/x86 con firmware 1.00 hasta 1.61, SEIL/B1 con firmware 1.00 hasta 3.11, SEIL/X1 con firmware 1.00 hasta 3.11, SEIL/X2 con firmware 1.00 hasta 3.11, SEIL/Turbo con firmware 1.80 hasta 2.10, y SEIL/neu 2FE Plus con firmware 1.80 hasta 2.10 puede permitir a atacantes remotos ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de un paquete PPPoE.\"}]",
      "id": "CVE-2011-0454",
      "lastModified": "2024-11-21T01:24:01.253",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 8.3, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 6.5, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2011-03-01T23:00:02.800",
      "references": "[{\"url\": \"http://jvn.jp/en/jp/JVN88991166/index.html\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"http://secunia.com/advisories/43494\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46598\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"http://www.seil.jp/support/security/a01001.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/65672\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"http://jvn.jp/en/jp/JVN88991166/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43494\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46598\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.seil.jp/support/security/a01001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/65672\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-0454\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2011-03-01T23:00:02.800\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer en el concentrador de acceso PPP (\\\"PPP Access Concentrator\\\" o PPPAC) en SEIL/x86 con firmware 1.00 hasta 1.61, SEIL/B1 con firmware 1.00 hasta 3.11, SEIL/X1 con firmware 1.00 hasta 3.11, SEIL/X2 con firmware 1.00 hasta 3.11, SEIL/Turbo con firmware 1.80 hasta 2.10, y SEIL/neu 2FE Plus con firmware 1.80 hasta 2.10 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete PPPoE.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":8.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":6.5,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F0BE07-FC42-4AB1-A553-1B254CC57D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DADC38F-D530-49FC-A834-3BBC5FF71C27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76EDD89-9C58-40BE-B7AE-72E82D051641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA0DBD0-9181-45DB-83AB-74B63C4644DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"488614FD-E4DF-4E6B-B928-444D98076F4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A638B5-5FBC-4193-879D-883CF2777200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE84A44-AAB5-4D3F-ADE5-617E58B14E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"507272EC-6B90-46DA-9E9A-EF5DCB770E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C74FA35-319D-4B10-868A-A6CFAD137978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B53A2B-FF57-42B1-957B-E01CC8DE087B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0D8323-9921-415C-B47C-49A947068F68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBE6E5A-691F-46EF-B999-18ED949BF2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11181F82-4A35-43AD-838E-E07092DF8652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD9E04C4-EA46-4F14-A60B-12CAD9E98485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1108097E-7B13-41A8-A6FC-0F958BFEB94F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB61B92-399A-45AD-A2EB-886F01DE57D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0928B5-60AB-4F2B-BF12-EEFF0CC38CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C0244F-E26B-45E6-A14F-0482B22C4E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D4FF3BD-1659-4582-AF3E-385829001579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2F107CD-7985-4529-B9CB-F15C9EE80975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C947580-1489-4B27-A740-1A5853170E89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/b1:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE3BBD4-FB2E-4543-9149-0452B26FAC31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2D29BB-DAEC-4D24-AA79-E7F136D37B0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B23BF51-78E0-46B7-8288-16EB6C1D210C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C86E4-3E0F-4A75-BD27-EF8BE4F48894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D7717A-A3E4-45A8-A774-3C2855267FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7500641-D607-4221-ADA2-CBCC338F22A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A290E5-32F5-42AE-BDE8-C92B84A44D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BC7F97-3208-43EE-B931-A28CD9A3515F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C03EE30-DC89-4926-A1FF-F878B4F9E205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90546F95-8BA1-4F13-86F4-91F797528281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A47FE3-A7E3-41FF-81B2-A41CCB776924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B75E486-B21A-4155-A4F8-155CD3A2EB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10BC7EF-5A3B-4026-9EDA-15061EBF814E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23564CCD-7EF3-4457-99FB-BFE966D35D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD52B307-EA12-48FC-ACD5-01AEDED44A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F1D4E9-40BB-4BA6-9C44-5E06C8D98291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6EC374-64D2-4990-A4C4-86529CCF27C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAA887F-7944-4C31-A191-0A39BC4E6544\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A5F2AA-23C4-43D4-B355-A9971503E3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EA78DB-5273-48F5-9350-EABAEE8FD79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E805B146-572E-466E-BF0B-6B53970A72EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AAEE2F-8D63-4167-A6C8-DAD2F235015D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C83696CE-91F3-4559-B16A-D1CF1C915515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF4C61B-393E-44E4-9404-BC331C8E8729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4E913E-1E8D-439B-8B77-35A54E42EC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75C2643-7F2A-4C34-94A0-DCB60399EF07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B8E0B95-CFD0-4501-B98E-FC05113F7022\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F916DA4-79A9-4523-907C-812E3FDF69FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9E82EF-2A12-4A7F-8559-D8D2147FB74D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADEE64C1-72A3-42FF-A13F-7F3E5F41F53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC574B6-B448-4A51-B5A0-2F521205D4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A0080D-3532-46E2-AC7D-F3E3E73622D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/x1:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A63E557-3BA6-4E0E-8597-BAA112B21DEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59204C16-8DC1-4BA0-9F73-560CC6D0E37B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A420F017-83DC-4029-A0F8-F50ED600CEA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2923D4A5-FD10-4846-B2F5-93C64DEB081E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D07EB84-D033-423B-AD53-D7B47DC508C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB31A5D1-6219-4E7D-965A-65C885C71C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4383E0DF-E0D2-4E59-8053-CFD57F4C11C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B9C033-965D-420F-8F71-C650592D5AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCB5982-5ECF-471C-8731-59AB4784055F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF907907-1E85-4F85-84ED-0DB73466186F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429DBDFD-C32D-4888-BC36-FCE5896FC963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C47A3C-D478-44E9-8183-735CF9CFBC2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"416DCB14-271A-4578-9AE7-418C75ADC4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBFCE3F-FE95-4559-A972-5241D48CB902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0064F721-57E1-4AC4-A3C3-92E05B64F0F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED8A76A3-9CD8-4A3C-BDD4-53407A92E527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509DC30B-7D2F-43A7-9FD3-71FC405F520E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809E64CE-504D-49BB-8C76-09D95F814893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC22870-8A4A-483E-AA38-325E1564E4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07952D84-10F6-46D0-B896-89401F063888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB8C1C6-D47D-4A85-8997-9E356688DA24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AB01A2-0CC3-49E6-B1A1-FF1BD918019E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38FA01CD-625E-4DE4-8898-725AF4D8D2B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B39BDF-A579-4C67-98E8-C017F426076C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6285D504-1960-42B4-8F7B-1AEDEB9AE865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F9FFA1-A224-473B-9827-7F5F40A20837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F86FC7-A7B2-4A58-9CDA-3056CE4C9AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35160F7C-5804-4A43-96F8-31456EED7DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"486D5372-371D-4E43-B2AA-2E7236C8BDB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/x2:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x86_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73301872-EFC2-4E08-B166-ECBBEC6DB310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x86_firmware:1.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C2C21D-8DEA-4BD4-B116-875DAF8F9AB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/x86:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477E1688-0CA2-4BD0-A29C-3239B760FA3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB84E030-ADCF-4A17-878C-BE6FD000DA18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D157BDC2-5ABA-4B94-B497-7814656FB4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57A7B71-F867-4229-96C5-F92DA246965D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF8B532D-A45C-4111-A251-2BD9130DA95A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F235CD04-35C6-4682-A106-843CF8E46110\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A112F5-13F8-462E-87CF-AB2CC460CEF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF5549D-33D5-420A-9B3E-6DF9312C4E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B08D35-81CD-40C1-B2D9-84D6E59CF0C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60CE6E6-9534-449B-A94A-BEBA13098168\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E4367A-457C-4B7F-9BE8-53E3D2B49619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA6C92F-E66D-452C-9270-6DFC4D7F1F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F116BC45-BE30-4792-9608-EFB81C98474D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE8DDF0-7669-45BD-820C-81FC8E13155F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"601CA34B-CAC4-4ED9-8ACB-5A33CC094043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:1.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D045157-F49D-43B5-B72E-21E04169F6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F74F4DE-5345-4143-8491-E7309E382F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A875FD5-EB5C-4656-AB9D-18C4B8292603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B674EC4-814A-47FD-AA07-F2771A69E8FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3472F4F-8EB5-4FB1-A4D8-906C12881A19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37EF3613-AC50-4247-944C-C458665586EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956BF1C-0002-496A-A016-6EB39241A6BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E1F0CCF-9850-4947-AB9B-B6B1F9B062D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF1465E3-0262-4D2F-BE9F-283975E2333A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3165577-0B87-432C-9358-0AABDC43962F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"218A23E8-73D4-455C-9394-6815393FF16D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/turbo_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96AD6D79-11A9-495B-A2B5-72FB4F038285\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/turbo:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC88F5F6-CB51-4676-91D6-69668229E675\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8670AD0-35C3-4438-A181-7521EC847A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC07A9F-315F-4568-BFE8-F0059DE1F9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"940393EB-8F83-4F7C-89B3-ACD8408DB042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7020FE3C-4828-4A93-AB2A-468E560D8B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"453CDEAE-AC98-43E0-A911-81851218627C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65AB86F2-B376-485F-B5B0-320F6ADA07BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C827210B-2416-4359-9332-E90FF4F21677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E12BA97C-1DCB-46D2-B0CB-1ACE81075706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E77F9AD8-D3A9-4F54-9FE4-92BBD2F46AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA6A477-7672-47EB-B87C-E1C6AAF50F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88FE1585-45C4-429F-928A-C046ABCA9017\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA2BCF0-C05B-41C5-96B5-C95DD436F8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1869AC1F-51B0-4526-8EDA-DEF06C367451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF07485-398B-47D4-862A-95F7E5E290E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE93F86-E9A8-4998-BBF3-FF7EDD77B97C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D2A024-111B-4277-8C98-65A68D08EBD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F6905E-F264-4646-A242-6594431F14A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0773B6A6-ABAD-44A6-B603-8223A6DFBB19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E78806-7F68-4544-ADAE-C406320BE9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D036A01-44D0-4765-9A9A-FF85AF6F2288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"606B52C7-1B72-457E-88F8-F640D9680561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1171554F-CD60-4828-B09F-067F15970A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D887445-7CD6-4F2A-BC42-CF695A68269E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F891F4-BB36-4B92-B87D-261CECA4DD15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2696E1-2EE9-4020-857A-2F548FB61D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A0AD7B-23AC-4292-9572-1C3574327C95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/neu_2fe_plus:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB4A421-197B-4654-B362-AEDA3ADADC33\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN88991166/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://secunia.com/advisories/43494\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46598\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://www.seil.jp/support/security/a01001.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65672\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN88991166/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46598\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.seil.jp/support/security/a01001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…