cve-2019-5985
Vulnerability from cvelistv5
Published
2019-09-12 15:58
Modified
2024-08-04 20:09
Severity ?
Summary
Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION Hikari Denwa router/Home GateWay Version: PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier
Version: PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier
Version: PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier
Version: PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier
Version: PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier
Version: PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier
Version: PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier
Version: PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:09:24.041Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Hikari Denwa router/Home GateWay",
          "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
            },
            {
              "status": "affected",
              "version": "RS-500KI firmware version Ver.01.00.0070 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
            },
            {
              "status": "affected",
              "version": "RS-500MI firmware version Ver.03.01.0019 and earlier"
            }
          ]
        },
        {
          "product": "Hikari Denwa router/Home GateWay",
          "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-12T15:58:55",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2019-5985",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hikari Denwa router/Home GateWay",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
                          },
                          {
                            "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
                          },
                          {
                            "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
                          },
                          {
                            "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
                          },
                          {
                            "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
                          },
                          {
                            "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
                          },
                          {
                            "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
                          },
                          {
                            "version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
                          },
                          {
                            "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
                          },
                          {
                            "version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hikari Denwa router/Home GateWay",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
                          },
                          {
                            "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
                          },
                          {
                            "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
                          },
                          {
                            "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
                          },
                          {
                            "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
                          },
                          {
                            "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
                          },
                          {
                            "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
                          },
                          {
                            "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://jvn.jp/en/jp/JVN43172719/index.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
            },
            {
              "name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
              "refsource": "CONFIRM",
              "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2019-5985",
    "datePublished": "2019-09-12T15:58:55",
    "dateReserved": "2019-01-10T00:00:00",
    "dateUpdated": "2024-08-04T20:09:24.041Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-5985\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2019-09-12T17:15:13.920\",\"lastModified\":\"2024-11-21T04:45:51.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de tipo cross-site scripting en Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR-S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver .7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, RS-500KI versi\u00f3n de firmware Ver.01.00.0070 y anteriores, PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0014 y anteriores, RS-500MI versi\u00f3n de firmware  Ver.03.01.0019 y anteriores, y Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR -S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE/RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver.7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, y PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0011 y anteriores), permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"1EBE4220-EF24-485A-AB30-6038C91768D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C15312-498E-46CB-9B10-83F7104ED9F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"4F8BF15F-8E64-49D1-BE8D-C116D661AD5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6D6876-3746-4B91-BF8B-1154C0FBF0CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-s340ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"AEA5D174-6A9F-4DED-830D-B4FB2E3B06BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-s340ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867F9670-E26E-41CD-8928-21A6D06E3E6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"E048BBD6-017B-440B-89FC-FCE49FAC8E09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7B6641-2B42-4B7F-AB93-FF8FAC8A966E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"7B240D97-02C7-4F93-80A4-51B080CFF76D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B131205-3529-41E5-B32A-CD02B56978AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-s340hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"521357D1-DBA4-44D0-B958-1EC51740AC1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-s340hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2681154-A957-4161-A2CC-B3DC73612AD6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"B1B37849-51E1-49BF-82BA-E5F5387408F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE81308-945D-4CF4-93F0-CD82EB4B6D35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"FE146FC8-3EE9-45AF-80EB-B580C8754C29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E072D0F-96F6-4BA3-BC0A-B4BBD4A23F1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-s340se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"E4E24D7D-42CF-45F4-B97F-D71EA9F19CA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-s340se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CE1C30-0E09-47A1-B971-FB8458B54D07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"62C90ABC-F71F-43FB-BB43-2B1755253519\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3E4C6A-A8B8-47D9-9961-12A57387EC00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"735371EF-C915-468A-8C28-49E2247BC481\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B89CF-7B6E-4490-BFB4-C2511FFB5C73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-440ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"A167F7CF-3330-4FFD-8D34-5E6A73D7ED1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-440ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14AB318B-CC0B-495C-9C1F-3617E12EA4B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"78E17878-D4C1-40F3-801C-833251F742A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8F7BD3-41BB-45D1-8FB4-C43C3D0A897A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"FA01846A-03E1-460A-A125-C48295A68A70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C000B6D4-2C4C-4296-A36C-3CE860C0A69C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-440ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"2AB7AEE3-1A92-4814-903B-58FB5D12CAC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-440ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5058C44F-65BF-46F2-83EC-F86FB12DC9CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"F0148DC3-8C3D-4444-89B8-43540BCDBD05\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF589E8-4E1A-43B2-9F44-513D393C2945\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"38CD99DC-AE49-46EF-99AF-608AF3945EFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64CEFE29-5AF9-4935-B084-6B556921AAF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"470F2E64-702D-40D5-9B21-7D367E24116D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154E8DF0-AAB4-4926-AD4E-2EB043736810\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"4F875EC6-0643-4587-BDF8-127DCE5C3143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C9385D-5484-417D-8773-F205F12117D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"C91BD0A2-4D05-41E5-98C1-47B43862FC47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8D6D4A-22E1-4B62-8B13-CF9063AD7DD3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rs-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0070\",\"matchCriteriaId\":\"50A45064-9DFB-4D56-BE6A-65A01A14990A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rs-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE50D80-6CF1-4B3C-9AF6-B94C287CD46A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:pr-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0014\",\"matchCriteriaId\":\"103E1E06-0259-4C21-8D85-D48851B74A97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:pr-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D7014F-F347-4291-BB66-65CB63B9EA6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rt-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0014\",\"matchCriteriaId\":\"47F39CA0-C422-4228-B84E-93C5C57BBC23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rt-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C45556F-C12D-465F-AA86-B4E71B18C40D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-east:rs-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"03.01.0019\",\"matchCriteriaId\":\"03242D06-C6AB-40B6-9076-0C1C83C24E94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-east:rs-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3484E4A4-074A-477A-A7A0-46B0FA5A4379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"4113497E-DD68-492D-8E0A-7F7A4646B834\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAE9AB5-BD95-4053-9A71-BEDD2BB68096\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-s300ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"D6C143C9-F508-42DC-8B03-49BFC18E7E08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-s300ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9678DF18-67AD-45DF-8353-A5CFDCA13D52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-s340ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.41\",\"matchCriteriaId\":\"02741C4D-66EA-456E-902B-F1EDDEB34701\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-s340ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF19D7E-1DD4-41EE-BB55-D269599BFC87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"D9ABCFFF-B416-4E92-BF43-927F6DE766D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE42A773-88DE-41D6-B46E-0EBBB4CD9D79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-s300hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"359AAE4D-CED9-4678-9530-392D6CB1430D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-s300hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7C2880-C054-4C47-91C8-C3158EB5DE46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-s340hi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.01.0005\",\"matchCriteriaId\":\"62A28085-7E3F-45B9-975C-A1110F8C73FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-s340hi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80294EE-A61D-47F6-B3D1-98620A55EDEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"7D105DDF-4BD5-44C7-A592-F2276499F174\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D652F91D-3AD1-4F02-9425-B199484874F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-s300se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"EFDF68F2-1C6D-4EF8-B4B0-A2A3423ED94A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-s300se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37433CCC-76EE-44AF-9C69-1BE04319CFAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-s340se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.40\",\"matchCriteriaId\":\"DA2FEE45-44F1-4CF4-AB09-BBECFDD2A697\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-s340se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0242EB0-9A5B-419B-B921-E1E162C0FF52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"69BE7425-95DD-4A72-A1E1-3B96BC4992CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8510090B-4EFE-4AE4-9652-1FCD996065DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-400ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"39DE11A3-E843-454A-89FB-2DDF9359EA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-400ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88613284-CA0B-42F9-B84C-450348B0BA5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-440ne_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.42\",\"matchCriteriaId\":\"9F2D7C89-5DB0-420E-91AE-029FE5FB9C63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-440ne:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A0DEE0-4CC5-4772-BAB5-48B7EDF45D99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"66A08A71-BA03-463E-89D0-2C33E2928936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E049AB0B-0658-4ABD-A1CE-6DCA297BB9AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-400ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"1332A727-100B-4608-96D5-CA29735FD88A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-400ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B45A478-B090-44D5-8098-A15468CF80BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-440ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1010\",\"matchCriteriaId\":\"AD2634F7-8D40-4200-9580-66598E51C360\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-440ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41205A7-84F1-449A-8C70-3FADD0F08A22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"F62FA20C-18F0-4E76-B6E5-CEB341694153\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A55EB69F-E103-4A45-8083-A2D6A3AD36C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"481822E3-CE35-42C8-AF58-4CF6CDBB8DCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76D559B-2936-41B9-A810-1658CE125A5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.00.1012\",\"matchCriteriaId\":\"D9D2EC44-74B1-43D9-A1CB-3886B8B10447\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2561A87-C99A-4E27-A0AE-E22EE2513735\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"82F89DFB-ED2B-45BC-8BA1-C9175E87F0AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E74A296-C5EA-45C4-B72A-2369487429B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-500ki_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.00.0090\",\"matchCriteriaId\":\"23BDD7E8-D12C-4DA5-9C61-CBD83B0A60DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-500ki:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C38F82A9-DE88-48CA-BA96-216B2103BCBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:pr-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0011\",\"matchCriteriaId\":\"60C68E10-FD43-483E-A08D-96F4D9DBEFAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:pr-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E42CECB-A9FB-4B8D-9662-764DB456B847\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ntt-west:rt-500mi_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.01.0011\",\"matchCriteriaId\":\"826D771E-C3D8-439D-B16C-F3CAE7BB762D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ntt-west:rt-500mi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0B6E35-3BBB-4859-A5C4-95588D5AD2C2\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN43172719/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN43172719/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.