cve-2019-5985
Vulnerability from cvelistv5
Published
2019-09-12 15:58
Modified
2024-08-04 20:09
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN43172719/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN43172719/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION | Hikari Denwa router/Home GateWay |
Version: PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier Version: PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier Version: PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier Version: PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier Version: PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier Version: PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier Version: PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier Version: RS-500KI firmware version Ver.01.00.0070 and earlier Version: PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier Version: RS-500MI firmware version Ver.03.01.0019 and earlier |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:09:24.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN43172719/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Hikari Denwa router/Home GateWay", "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "versions": [ { "status": "affected", "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" }, { "status": "affected", "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" }, { "status": "affected", "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" }, { "status": "affected", "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" }, { "status": "affected", "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" }, { "status": "affected", "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" }, { "status": "affected", "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" }, { "status": "affected", "version": "RS-500KI firmware version Ver.01.00.0070 and earlier" }, { "status": "affected", "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier" }, { "status": "affected", "version": "RS-500MI firmware version Ver.03.01.0019 and earlier" } ] }, { "product": "Hikari Denwa router/Home GateWay", "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", "versions": [ { "status": "affected", "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" }, { "status": "affected", "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" }, { "status": "affected", "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" }, { "status": "affected", "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" }, { "status": "affected", "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" }, { "status": "affected", "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" }, { "status": "affected", "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" }, { "status": "affected", "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-12T15:58:55", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/en/jp/JVN43172719/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2019-5985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Hikari Denwa router/Home GateWay", "version": { "version_data": [ { "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" }, { "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" }, { "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" }, { "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" }, { "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" }, { "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" }, { "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" }, { "version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier" }, { "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier" }, { "version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier" } ] } } ] }, "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION" }, { "product": { "product_data": [ { "product_name": "Hikari Denwa router/Home GateWay", "version": { "version_data": [ { "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" }, { "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" }, { "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" }, { "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" }, { "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" }, { "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" }, { "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" }, { "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier" } ] } } ] }, "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] } ] }, "references": { "reference_data": [ { "name": "http://jvn.jp/en/jp/JVN43172719/index.html", "refsource": "MISC", "url": "http://jvn.jp/en/jp/JVN43172719/index.html" }, { "name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html", "refsource": "CONFIRM", "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2019-5985", "datePublished": "2019-09-12T15:58:55", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:09:24.041Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-5985\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2019-09-12T17:15:13.920\",\"lastModified\":\"2024-11-21T04:45:51.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de tipo cross-site scripting en Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR-S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver .7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, RS-500KI versi\u00f3n de firmware Ver.01.00.0070 y anteriores, PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0014 y anteriores, RS-500MI versi\u00f3n de firmware Ver.03.01.0019 y anteriores, y Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR -S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE/RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver.7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, y PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0011 y anteriores), permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"1EBE4220-EF24-485A-AB30-6038C91768D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C15312-498E-46CB-9B10-83F7104ED9F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"4F8BF15F-8E64-49D1-BE8D-C116D661AD5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6D6876-3746-4B91-BF8B-1154C0FBF0CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-s340ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"AEA5D174-6A9F-4DED-830D-B4FB2E3B06BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-s340ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867F9670-E26E-41CD-8928-21A6D06E3E6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"E048BBD6-017B-440B-89FC-FCE49FAC8E09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7B6641-2B42-4B7F-AB93-FF8FAC8A966E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"7B240D97-02C7-4F93-80A4-51B080CFF76D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B131205-3529-41E5-B32A-CD02B56978AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-s340hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"521357D1-DBA4-44D0-B958-1EC51740AC1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-s340hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2681154-A957-4161-A2CC-B3DC73612AD6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"B1B37849-51E1-49BF-82BA-E5F5387408F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE81308-945D-4CF4-93F0-CD82EB4B6D35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"FE146FC8-3EE9-45AF-80EB-B580C8754C29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E072D0F-96F6-4BA3-BC0A-B4BBD4A23F1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-s340se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"E4E24D7D-42CF-45F4-B97F-D71EA9F19CA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-s340se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CE1C30-0E09-47A1-B971-FB8458B54D07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"62C90ABC-F71F-43FB-BB43-2B1755253519\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3E4C6A-A8B8-47D9-9961-12A57387EC00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"735371EF-C915-468A-8C28-49E2247BC481\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B89CF-7B6E-4490-BFB4-C2511FFB5C73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-440ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"A167F7CF-3330-4FFD-8D34-5E6A73D7ED1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-440ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14AB318B-CC0B-495C-9C1F-3617E12EA4B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"78E17878-D4C1-40F3-801C-833251F742A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8F7BD3-41BB-45D1-8FB4-C43C3D0A897A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"FA01846A-03E1-460A-A125-C48295A68A70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C000B6D4-2C4C-4296-A36C-3CE860C0A69C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-440ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"2AB7AEE3-1A92-4814-903B-58FB5D12CAC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-440ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5058C44F-65BF-46F2-83EC-F86FB12DC9CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"F0148DC3-8C3D-4444-89B8-43540BCDBD05\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF589E8-4E1A-43B2-9F44-513D393C2945\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"38CD99DC-AE49-46EF-99AF-608AF3945EFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64CEFE29-5AF9-4935-B084-6B556921AAF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"470F2E64-702D-40D5-9B21-7D367E24116D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154E8DF0-AAB4-4926-AD4E-2EB043736810\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"4F875EC6-0643-4587-BDF8-127DCE5C3143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C9385D-5484-417D-8773-F205F12117D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"C91BD0A2-4D05-41E5-98C1-47B43862FC47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8D6D4A-22E1-4B62-8B13-CF9063AD7DD3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rs-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0070\",\"matchCriteriaId\":\"50A45064-9DFB-4D56-BE6A-65A01A14990A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rs-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE50D80-6CF1-4B3C-9AF6-B94C287CD46A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0014\",\"matchCriteriaId\":\"103E1E06-0259-4C21-8D85-D48851B74A97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D7014F-F347-4291-BB66-65CB63B9EA6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0014\",\"matchCriteriaId\":\"47F39CA0-C422-4228-B84E-93C5C57BBC23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C45556F-C12D-465F-AA86-B4E71B18C40D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rs-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"03.01.0019\",\"matchCriteriaId\":\"03242D06-C6AB-40B6-9076-0C1C83C24E94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rs-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3484E4A4-074A-477A-A7A0-46B0FA5A4379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"4113497E-DD68-492D-8E0A-7F7A4646B834\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAE9AB5-BD95-4053-9A71-BEDD2BB68096\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"D6C143C9-F508-42DC-8B03-49BFC18E7E08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9678DF18-67AD-45DF-8353-A5CFDCA13D52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-s340ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"02741C4D-66EA-456E-902B-F1EDDEB34701\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-s340ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF19D7E-1DD4-41EE-BB55-D269599BFC87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"D9ABCFFF-B416-4E92-BF43-927F6DE766D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE42A773-88DE-41D6-B46E-0EBBB4CD9D79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"359AAE4D-CED9-4678-9530-392D6CB1430D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7C2880-C054-4C47-91C8-C3158EB5DE46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-s340hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"62A28085-7E3F-45B9-975C-A1110F8C73FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-s340hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80294EE-A61D-47F6-B3D1-98620A55EDEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"7D105DDF-4BD5-44C7-A592-F2276499F174\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D652F91D-3AD1-4F02-9425-B199484874F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"EFDF68F2-1C6D-4EF8-B4B0-A2A3423ED94A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37433CCC-76EE-44AF-9C69-1BE04319CFAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-s340se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"DA2FEE45-44F1-4CF4-AB09-BBECFDD2A697\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-s340se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0242EB0-9A5B-419B-B921-E1E162C0FF52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"69BE7425-95DD-4A72-A1E1-3B96BC4992CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8510090B-4EFE-4AE4-9652-1FCD996065DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"39DE11A3-E843-454A-89FB-2DDF9359EA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88613284-CA0B-42F9-B84C-450348B0BA5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-440ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"9F2D7C89-5DB0-420E-91AE-029FE5FB9C63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-440ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A0DEE0-4CC5-4772-BAB5-48B7EDF45D99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"66A08A71-BA03-463E-89D0-2C33E2928936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E049AB0B-0658-4ABD-A1CE-6DCA297BB9AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"1332A727-100B-4608-96D5-CA29735FD88A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B45A478-B090-44D5-8098-A15468CF80BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-440ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"AD2634F7-8D40-4200-9580-66598E51C360\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-440ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41205A7-84F1-449A-8C70-3FADD0F08A22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"F62FA20C-18F0-4E76-B6E5-CEB341694153\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A55EB69F-E103-4A45-8083-A2D6A3AD36C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"481822E3-CE35-42C8-AF58-4CF6CDBB8DCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76D559B-2936-41B9-A810-1658CE125A5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"D9D2EC44-74B1-43D9-A1CB-3886B8B10447\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2561A87-C99A-4E27-A0AE-E22EE2513735\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"82F89DFB-ED2B-45BC-8BA1-C9175E87F0AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E74A296-C5EA-45C4-B72A-2369487429B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"23BDD7E8-D12C-4DA5-9C61-CBD83B0A60DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C38F82A9-DE88-48CA-BA96-216B2103BCBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0011\",\"matchCriteriaId\":\"60C68E10-FD43-483E-A08D-96F4D9DBEFAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E42CECB-A9FB-4B8D-9662-764DB456B847\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0011\",\"matchCriteriaId\":\"826D771E-C3D8-439D-B16C-F3CAE7BB762D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0B6E35-3BBB-4859-A5C4-95588D5AD2C2\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN43172719/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN43172719/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.