Vulnerabilites related to ntt-west - rt-s300hi_firmware
CVE-2019-5985 (GCVE-0-2019-5985)
Vulnerability from cvelistv5
Published
2019-09-12 15:58
Modified
2024-08-04 20:09
Severity ?
CWE
  • Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Summary
Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION Hikari Denwa router/Home GateWay Version: PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier
Version: PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier
Version: PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier
Version: PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier
Version: PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier
Version: PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier
Version: PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier
Version: RS-500KI firmware version Ver.01.00.0070 and earlier
Version: PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier
Version: RS-500MI firmware version Ver.03.01.0019 and earlier
Create a notification for this product.
   Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION Hikari Denwa router/Home GateWay Version: PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier
Version: PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier
Version: PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier
Version: PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier
Version: PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier
Version: PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier
Version: PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier
Version: PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:09:24.041Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Hikari Denwa router/Home GateWay",
          "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
            },
            {
              "status": "affected",
              "version": "RS-500KI firmware version Ver.01.00.0070 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
            },
            {
              "status": "affected",
              "version": "RS-500MI firmware version Ver.03.01.0019 and earlier"
            }
          ]
        },
        {
          "product": "Hikari Denwa router/Home GateWay",
          "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-12T15:58:55",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2019-5985",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hikari Denwa router/Home GateWay",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
                          },
                          {
                            "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
                          },
                          {
                            "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
                          },
                          {
                            "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
                          },
                          {
                            "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
                          },
                          {
                            "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
                          },
                          {
                            "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
                          },
                          {
                            "version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
                          },
                          {
                            "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
                          },
                          {
                            "version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hikari Denwa router/Home GateWay",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
                          },
                          {
                            "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
                          },
                          {
                            "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
                          },
                          {
                            "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
                          },
                          {
                            "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
                          },
                          {
                            "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
                          },
                          {
                            "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
                          },
                          {
                            "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://jvn.jp/en/jp/JVN43172719/index.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
            },
            {
              "name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
              "refsource": "CONFIRM",
              "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2019-5985",
    "datePublished": "2019-09-12T15:58:55",
    "dateReserved": "2019-01-10T00:00:00",
    "dateUpdated": "2024-08-04T20:09:24.041Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5986 (GCVE-0-2019-5986)
Vulnerability from cvelistv5
Published
2019-09-12 15:58
Modified
2024-08-04 20:09
Severity ?
CWE
  • Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors.
Summary
Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors.
Impacted products
Vendor Product Version
Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION Hikari Denwa router/Home GateWay Version: PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier
Version: PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier
Version: PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier
Version: PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier
Version: PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier
Version: PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier
Version: PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier
Version: RS-500KI firmware version Ver.01.00.0070 and earlier
Version: PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier
Version: RS-500MI firmware version Ver.03.01.0019 and earlier
Create a notification for this product.
   Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION Hikari Denwa router/Home GateWay Version: PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier
Version: PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier
Version: PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier
Version: PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier
Version: PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier
Version: PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier
Version: PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier
Version: PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:09:23.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Hikari Denwa router/Home GateWay",
          "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
            },
            {
              "status": "affected",
              "version": "RS-500KI firmware version Ver.01.00.0070 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
            },
            {
              "status": "affected",
              "version": "RS-500MI firmware version Ver.03.01.0019 and earlier"
            }
          ]
        },
        {
          "product": "Hikari Denwa router/Home GateWay",
          "vendor": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
            },
            {
              "status": "affected",
              "version": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-12T15:58:55",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2019-5986",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hikari Denwa router/Home GateWay",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
                          },
                          {
                            "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
                          },
                          {
                            "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
                          },
                          {
                            "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
                          },
                          {
                            "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
                          },
                          {
                            "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
                          },
                          {
                            "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
                          },
                          {
                            "version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
                          },
                          {
                            "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
                          },
                          {
                            "version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Hikari Denwa router/Home GateWay",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
                          },
                          {
                            "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
                          },
                          {
                            "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
                          },
                          {
                            "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
                          },
                          {
                            "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
                          },
                          {
                            "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
                          },
                          {
                            "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
                          },
                          {
                            "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://jvn.jp/en/jp/JVN43172719/index.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
            },
            {
              "name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
              "refsource": "CONFIRM",
              "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2019-5986",
    "datePublished": "2019-09-12T15:58:55",
    "dateReserved": "2019-01-10T00:00:00",
    "dateUpdated": "2024-08-04T20:09:23.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-09-12 17:15
Modified
2024-11-21 04:45
Summary
Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors.
Impacted products
Vendor Product Version
ntt-east pr-s300ne_firmware *
ntt-east pr-s300ne -
ntt-east rt-s300ne_firmware *
ntt-east rt-s300ne -
ntt-east rv-s340ne_firmware *
ntt-east rv-s340ne -
ntt-east pr-s300hi_firmware *
ntt-east pr-s300hi -
ntt-east rt-s300hi_firmware *
ntt-east rt-s300hi -
ntt-east rv-s340hi_firmware *
ntt-east rv-s340hi -
ntt-east pr-s300se_firmware *
ntt-east pr-s300se -
ntt-east rt-s300se_firmware *
ntt-east rt-s300se -
ntt-east rv-s340se_firmware *
ntt-east rv-s340se -
ntt-east pr-400ne_firmware *
ntt-east pr-400ne -
ntt-east rt-400ne_firmware *
ntt-east rt-400ne -
ntt-east rv-440ne_firmware *
ntt-east rv-440ne -
ntt-east pr-400ki_firmware *
ntt-east pr-400ki -
ntt-east rt-400ki_firmware *
ntt-east rt-400ki -
ntt-east rv-440ki_firmware *
ntt-east rv-440ki -
ntt-east pr-400mi_firmware *
ntt-east pr-400mi -
ntt-east rt-400mi_firmware *
ntt-east rt-400mi -
ntt-east rv-440mi_firmware *
ntt-east rv-440mi -
ntt-east pr-500ki_firmware *
ntt-east pr-500ki -
ntt-east rt-500ki_firmware *
ntt-east rt-500ki -
ntt-east rs-500ki_firmware *
ntt-east rs-500ki -
ntt-east pr-500mi_firmware *
ntt-east pr-500mi -
ntt-east rt-500mi_firmware *
ntt-east rt-500mi -
ntt-east rs-500mi_firmware *
ntt-east rs-500mi -
ntt-west pr-s300ne_firmware *
ntt-west pr-s300ne -
ntt-west rt-s300ne_firmware *
ntt-west rt-s300ne -
ntt-west rv-s340ne_firmware *
ntt-west rv-s340ne -
ntt-west pr-s300hi_firmware *
ntt-west pr-s300hi -
ntt-west rt-s300hi_firmware *
ntt-west rt-s300hi -
ntt-west rv-s340hi_firmware *
ntt-west rv-s340hi -
ntt-west pr-s300se_firmware *
ntt-west pr-s300se -
ntt-west rt-s300se_firmware *
ntt-west rt-s300se -
ntt-west rv-s340se_firmware *
ntt-west rv-s340se -
ntt-west pr-400ne_firmware *
ntt-west pr-400ne -
ntt-west rt-400ne_firmware *
ntt-west rt-400ne -
ntt-west rv-440ne_firmware *
ntt-west rv-440ne -
ntt-west pr-400ki_firmware *
ntt-west pr-400ki -
ntt-west rt-400ki_firmware *
ntt-west rt-400ki -
ntt-west rv-440ki_firmware *
ntt-west rv-440ki -
ntt-west pr-400mi_firmware *
ntt-west pr-400mi -
ntt-west rt-400mi_firmware *
ntt-west rt-400mi -
ntt-west rv-440mi_firmware *
ntt-west rv-440mi -
ntt-west pr-500ki_firmware *
ntt-west pr-500ki -
ntt-west rt-500ki_firmware *
ntt-west rt-500ki -
ntt-west pr-500mi_firmware *
ntt-west pr-500mi -
ntt-west rt-500mi_firmware *
ntt-west rt-500mi -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBE4220-EF24-485A-AB30-6038C91768D0",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C15312-498E-46CB-9B10-83F7104ED9F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BF15F-8E64-49D1-BE8D-C116D661AD5E",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6D6876-3746-4B91-BF8B-1154C0FBF0CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-s340ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEA5D174-6A9F-4DED-830D-B4FB2E3B06BC",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-s340ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "867F9670-E26E-41CD-8928-21A6D06E3E6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E048BBD6-017B-440B-89FC-FCE49FAC8E09",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7B6641-2B42-4B7F-AB93-FF8FAC8A966E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B240D97-02C7-4F93-80A4-51B080CFF76D",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B131205-3529-41E5-B32A-CD02B56978AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-s340hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "521357D1-DBA4-44D0-B958-1EC51740AC1A",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-s340hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2681154-A957-4161-A2CC-B3DC73612AD6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B37849-51E1-49BF-82BA-E5F5387408F2",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EE81308-945D-4CF4-93F0-CD82EB4B6D35",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE146FC8-3EE9-45AF-80EB-B580C8754C29",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E072D0F-96F6-4BA3-BC0A-B4BBD4A23F1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-s340se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4E24D7D-42CF-45F4-B97F-D71EA9F19CA0",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-s340se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CE1C30-0E09-47A1-B971-FB8458B54D07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C90ABC-F71F-43FB-BB43-2B1755253519",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD3E4C6A-A8B8-47D9-9961-12A57387EC00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "735371EF-C915-468A-8C28-49E2247BC481",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B89CF-7B6E-4490-BFB4-C2511FFB5C73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-440ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A167F7CF-3330-4FFD-8D34-5E6A73D7ED1F",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-440ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14AB318B-CC0B-495C-9C1F-3617E12EA4B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E17878-D4C1-40F3-801C-833251F742A0",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8F7BD3-41BB-45D1-8FB4-C43C3D0A897A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA01846A-03E1-460A-A125-C48295A68A70",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C000B6D4-2C4C-4296-A36C-3CE860C0A69C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-440ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB7AEE3-1A92-4814-903B-58FB5D12CAC7",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-440ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5058C44F-65BF-46F2-83EC-F86FB12DC9CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0148DC3-8C3D-4444-89B8-43540BCDBD05",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF589E8-4E1A-43B2-9F44-513D393C2945",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38CD99DC-AE49-46EF-99AF-608AF3945EFF",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CEFE29-5AF9-4935-B084-6B556921AAF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "470F2E64-702D-40D5-9B21-7D367E24116D",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "154E8DF0-AAB4-4926-AD4E-2EB043736810",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F875EC6-0643-4587-BDF8-127DCE5C3143",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6C9385D-5484-417D-8773-F205F12117D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91BD0A2-4D05-41E5-98C1-47B43862FC47",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8D6D4A-22E1-4B62-8B13-CF9063AD7DD3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rs-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A45064-9DFB-4D56-BE6A-65A01A14990A",
              "versionEndIncluding": "01.00.0070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rs-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE50D80-6CF1-4B3C-9AF6-B94C287CD46A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "103E1E06-0259-4C21-8D85-D48851B74A97",
              "versionEndIncluding": "01.01.0014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D7014F-F347-4291-BB66-65CB63B9EA6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47F39CA0-C422-4228-B84E-93C5C57BBC23",
              "versionEndIncluding": "01.01.0014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C45556F-C12D-465F-AA86-B4E71B18C40D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rs-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03242D06-C6AB-40B6-9076-0C1C83C24E94",
              "versionEndIncluding": "03.01.0019",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rs-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484E4A4-074A-477A-A7A0-46B0FA5A4379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4113497E-DD68-492D-8E0A-7F7A4646B834",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FAE9AB5-BD95-4053-9A71-BEDD2BB68096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6C143C9-F508-42DC-8B03-49BFC18E7E08",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9678DF18-67AD-45DF-8353-A5CFDCA13D52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-s340ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02741C4D-66EA-456E-902B-F1EDDEB34701",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-s340ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF19D7E-1DD4-41EE-BB55-D269599BFC87",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9ABCFFF-B416-4E92-BF43-927F6DE766D9",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE42A773-88DE-41D6-B46E-0EBBB4CD9D79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "359AAE4D-CED9-4678-9530-392D6CB1430D",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C7C2880-C054-4C47-91C8-C3158EB5DE46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-s340hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A28085-7E3F-45B9-975C-A1110F8C73FD",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-s340hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80294EE-A61D-47F6-B3D1-98620A55EDEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D105DDF-4BD5-44C7-A592-F2276499F174",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D652F91D-3AD1-4F02-9425-B199484874F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFDF68F2-1C6D-4EF8-B4B0-A2A3423ED94A",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37433CCC-76EE-44AF-9C69-1BE04319CFAE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-s340se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2FEE45-44F1-4CF4-AB09-BBECFDD2A697",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-s340se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0242EB0-9A5B-419B-B921-E1E162C0FF52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE7425-95DD-4A72-A1E1-3B96BC4992CF",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8510090B-4EFE-4AE4-9652-1FCD996065DF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DE11A3-E843-454A-89FB-2DDF9359EA8D",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88613284-CA0B-42F9-B84C-450348B0BA5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-440ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2D7C89-5DB0-420E-91AE-029FE5FB9C63",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-440ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29A0DEE0-4CC5-4772-BAB5-48B7EDF45D99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A08A71-BA03-463E-89D0-2C33E2928936",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E049AB0B-0658-4ABD-A1CE-6DCA297BB9AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1332A727-100B-4608-96D5-CA29735FD88A",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B45A478-B090-44D5-8098-A15468CF80BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-440ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2634F7-8D40-4200-9580-66598E51C360",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-440ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A41205A7-84F1-449A-8C70-3FADD0F08A22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62FA20C-18F0-4E76-B6E5-CEB341694153",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A55EB69F-E103-4A45-8083-A2D6A3AD36C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481822E3-CE35-42C8-AF58-4CF6CDBB8DCC",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76D559B-2936-41B9-A810-1658CE125A5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9D2EC44-74B1-43D9-A1CB-3886B8B10447",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2561A87-C99A-4E27-A0AE-E22EE2513735",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F89DFB-ED2B-45BC-8BA1-C9175E87F0AA",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E74A296-C5EA-45C4-B72A-2369487429B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BDD7E8-D12C-4DA5-9C61-CBD83B0A60DB",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38F82A9-DE88-48CA-BA96-216B2103BCBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C68E10-FD43-483E-A08D-96F4D9DBEFAB",
              "versionEndIncluding": "01.01.0011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E42CECB-A9FB-4B8D-9662-764DB456B847",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "826D771E-C3D8-439D-B16C-F3CAE7BB762D",
              "versionEndIncluding": "01.01.0011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0B6E35-3BBB-4859-A5C4-95588D5AD2C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de tipo cross-site request forgery (CSRF) en Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR-S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver .7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, RS-500KI versi\u00f3n de firmware Ver.01.00.0070 y anteriores, PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0014 y anteriores, RS-500MI versi\u00f3n de firmware  Ver.03.01.0019 y anteriores, y Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR -S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE/RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver.7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, y PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0011 y anteriores), permiten a atacantes remotos secuestrar la autenticaci\u00f3n de administradores por medio de vectores no especificados."
    }
  ],
  "id": "CVE-2019-5986",
  "lastModified": "2024-11-21T04:45:51.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-12T17:15:14.000",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-12 17:15
Modified
2024-11-21 04:45
Summary
Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
ntt-east pr-s300ne_firmware *
ntt-east pr-s300ne -
ntt-east rt-s300ne_firmware *
ntt-east rt-s300ne -
ntt-east rv-s340ne_firmware *
ntt-east rv-s340ne -
ntt-east pr-s300hi_firmware *
ntt-east pr-s300hi -
ntt-east rt-s300hi_firmware *
ntt-east rt-s300hi -
ntt-east rv-s340hi_firmware *
ntt-east rv-s340hi -
ntt-east pr-s300se_firmware *
ntt-east pr-s300se -
ntt-east rt-s300se_firmware *
ntt-east rt-s300se -
ntt-east rv-s340se_firmware *
ntt-east rv-s340se -
ntt-east pr-400ne_firmware *
ntt-east pr-400ne -
ntt-east rt-400ne_firmware *
ntt-east rt-400ne -
ntt-east rv-440ne_firmware *
ntt-east rv-440ne -
ntt-east pr-400ki_firmware *
ntt-east pr-400ki -
ntt-east rt-400ki_firmware *
ntt-east rt-400ki -
ntt-east rv-440ki_firmware *
ntt-east rv-440ki -
ntt-east pr-400mi_firmware *
ntt-east pr-400mi -
ntt-east rt-400mi_firmware *
ntt-east rt-400mi -
ntt-east rv-440mi_firmware *
ntt-east rv-440mi -
ntt-east pr-500ki_firmware *
ntt-east pr-500ki -
ntt-east rt-500ki_firmware *
ntt-east rt-500ki -
ntt-east rs-500ki_firmware *
ntt-east rs-500ki -
ntt-east pr-500mi_firmware *
ntt-east pr-500mi -
ntt-east rt-500mi_firmware *
ntt-east rt-500mi -
ntt-east rs-500mi_firmware *
ntt-east rs-500mi -
ntt-west pr-s300ne_firmware *
ntt-west pr-s300ne -
ntt-west rt-s300ne_firmware *
ntt-west rt-s300ne -
ntt-west rv-s340ne_firmware *
ntt-west rv-s340ne -
ntt-west pr-s300hi_firmware *
ntt-west pr-s300hi -
ntt-west rt-s300hi_firmware *
ntt-west rt-s300hi -
ntt-west rv-s340hi_firmware *
ntt-west rv-s340hi -
ntt-west pr-s300se_firmware *
ntt-west pr-s300se -
ntt-west rt-s300se_firmware *
ntt-west rt-s300se -
ntt-west rv-s340se_firmware *
ntt-west rv-s340se -
ntt-west pr-400ne_firmware *
ntt-west pr-400ne -
ntt-west rt-400ne_firmware *
ntt-west rt-400ne -
ntt-west rv-440ne_firmware *
ntt-west rv-440ne -
ntt-west pr-400ki_firmware *
ntt-west pr-400ki -
ntt-west rt-400ki_firmware *
ntt-west rt-400ki -
ntt-west rv-440ki_firmware *
ntt-west rv-440ki -
ntt-west pr-400mi_firmware *
ntt-west pr-400mi -
ntt-west rt-400mi_firmware *
ntt-west rt-400mi -
ntt-west rv-440mi_firmware *
ntt-west rv-440mi -
ntt-west pr-500ki_firmware *
ntt-west pr-500ki -
ntt-west rt-500ki_firmware *
ntt-west rt-500ki -
ntt-west pr-500mi_firmware *
ntt-west pr-500mi -
ntt-west rt-500mi_firmware *
ntt-west rt-500mi -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBE4220-EF24-485A-AB30-6038C91768D0",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C15312-498E-46CB-9B10-83F7104ED9F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BF15F-8E64-49D1-BE8D-C116D661AD5E",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6D6876-3746-4B91-BF8B-1154C0FBF0CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-s340ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEA5D174-6A9F-4DED-830D-B4FB2E3B06BC",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-s340ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "867F9670-E26E-41CD-8928-21A6D06E3E6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E048BBD6-017B-440B-89FC-FCE49FAC8E09",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7B6641-2B42-4B7F-AB93-FF8FAC8A966E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B240D97-02C7-4F93-80A4-51B080CFF76D",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B131205-3529-41E5-B32A-CD02B56978AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-s340hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "521357D1-DBA4-44D0-B958-1EC51740AC1A",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-s340hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2681154-A957-4161-A2CC-B3DC73612AD6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B37849-51E1-49BF-82BA-E5F5387408F2",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EE81308-945D-4CF4-93F0-CD82EB4B6D35",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE146FC8-3EE9-45AF-80EB-B580C8754C29",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E072D0F-96F6-4BA3-BC0A-B4BBD4A23F1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-s340se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4E24D7D-42CF-45F4-B97F-D71EA9F19CA0",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-s340se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CE1C30-0E09-47A1-B971-FB8458B54D07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C90ABC-F71F-43FB-BB43-2B1755253519",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD3E4C6A-A8B8-47D9-9961-12A57387EC00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "735371EF-C915-468A-8C28-49E2247BC481",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B89CF-7B6E-4490-BFB4-C2511FFB5C73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-440ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A167F7CF-3330-4FFD-8D34-5E6A73D7ED1F",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-440ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14AB318B-CC0B-495C-9C1F-3617E12EA4B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E17878-D4C1-40F3-801C-833251F742A0",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A8F7BD3-41BB-45D1-8FB4-C43C3D0A897A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA01846A-03E1-460A-A125-C48295A68A70",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C000B6D4-2C4C-4296-A36C-3CE860C0A69C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-440ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB7AEE3-1A92-4814-903B-58FB5D12CAC7",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-440ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5058C44F-65BF-46F2-83EC-F86FB12DC9CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0148DC3-8C3D-4444-89B8-43540BCDBD05",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF589E8-4E1A-43B2-9F44-513D393C2945",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38CD99DC-AE49-46EF-99AF-608AF3945EFF",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CEFE29-5AF9-4935-B084-6B556921AAF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "470F2E64-702D-40D5-9B21-7D367E24116D",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "154E8DF0-AAB4-4926-AD4E-2EB043736810",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F875EC6-0643-4587-BDF8-127DCE5C3143",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6C9385D-5484-417D-8773-F205F12117D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91BD0A2-4D05-41E5-98C1-47B43862FC47",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8D6D4A-22E1-4B62-8B13-CF9063AD7DD3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rs-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A45064-9DFB-4D56-BE6A-65A01A14990A",
              "versionEndIncluding": "01.00.0070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rs-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE50D80-6CF1-4B3C-9AF6-B94C287CD46A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:pr-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "103E1E06-0259-4C21-8D85-D48851B74A97",
              "versionEndIncluding": "01.01.0014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:pr-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D7014F-F347-4291-BB66-65CB63B9EA6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rt-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47F39CA0-C422-4228-B84E-93C5C57BBC23",
              "versionEndIncluding": "01.01.0014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rt-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C45556F-C12D-465F-AA86-B4E71B18C40D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-east:rs-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03242D06-C6AB-40B6-9076-0C1C83C24E94",
              "versionEndIncluding": "03.01.0019",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-east:rs-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484E4A4-074A-477A-A7A0-46B0FA5A4379",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4113497E-DD68-492D-8E0A-7F7A4646B834",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FAE9AB5-BD95-4053-9A71-BEDD2BB68096",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-s300ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6C143C9-F508-42DC-8B03-49BFC18E7E08",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-s300ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9678DF18-67AD-45DF-8353-A5CFDCA13D52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-s340ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02741C4D-66EA-456E-902B-F1EDDEB34701",
              "versionEndIncluding": "19.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-s340ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF19D7E-1DD4-41EE-BB55-D269599BFC87",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9ABCFFF-B416-4E92-BF43-927F6DE766D9",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE42A773-88DE-41D6-B46E-0EBBB4CD9D79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-s300hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "359AAE4D-CED9-4678-9530-392D6CB1430D",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-s300hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C7C2880-C054-4C47-91C8-C3158EB5DE46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-s340hi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A28085-7E3F-45B9-975C-A1110F8C73FD",
              "versionEndIncluding": "19.01.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-s340hi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80294EE-A61D-47F6-B3D1-98620A55EDEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D105DDF-4BD5-44C7-A592-F2276499F174",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D652F91D-3AD1-4F02-9425-B199484874F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-s300se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFDF68F2-1C6D-4EF8-B4B0-A2A3423ED94A",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-s300se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37433CCC-76EE-44AF-9C69-1BE04319CFAE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-s340se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2FEE45-44F1-4CF4-AB09-BBECFDD2A697",
              "versionEndIncluding": "19.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-s340se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0242EB0-9A5B-419B-B921-E1E162C0FF52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BE7425-95DD-4A72-A1E1-3B96BC4992CF",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8510090B-4EFE-4AE4-9652-1FCD996065DF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-400ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DE11A3-E843-454A-89FB-2DDF9359EA8D",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-400ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88613284-CA0B-42F9-B84C-450348B0BA5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-440ne_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2D7C89-5DB0-420E-91AE-029FE5FB9C63",
              "versionEndIncluding": "7.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-440ne:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29A0DEE0-4CC5-4772-BAB5-48B7EDF45D99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A08A71-BA03-463E-89D0-2C33E2928936",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E049AB0B-0658-4ABD-A1CE-6DCA297BB9AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-400ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1332A727-100B-4608-96D5-CA29735FD88A",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-400ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B45A478-B090-44D5-8098-A15468CF80BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-440ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2634F7-8D40-4200-9580-66598E51C360",
              "versionEndIncluding": "07.00.1010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-440ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A41205A7-84F1-449A-8C70-3FADD0F08A22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F62FA20C-18F0-4E76-B6E5-CEB341694153",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A55EB69F-E103-4A45-8083-A2D6A3AD36C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481822E3-CE35-42C8-AF58-4CF6CDBB8DCC",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76D559B-2936-41B9-A810-1658CE125A5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9D2EC44-74B1-43D9-A1CB-3886B8B10447",
              "versionEndIncluding": "07.00.1012",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2561A87-C99A-4E27-A0AE-E22EE2513735",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F89DFB-ED2B-45BC-8BA1-C9175E87F0AA",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E74A296-C5EA-45C4-B72A-2369487429B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-500ki_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BDD7E8-D12C-4DA5-9C61-CBD83B0A60DB",
              "versionEndIncluding": "01.00.0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-500ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38F82A9-DE88-48CA-BA96-216B2103BCBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:pr-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C68E10-FD43-483E-A08D-96F4D9DBEFAB",
              "versionEndIncluding": "01.01.0011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:pr-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E42CECB-A9FB-4B8D-9662-764DB456B847",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ntt-west:rt-500mi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "826D771E-C3D8-439D-B16C-F3CAE7BB762D",
              "versionEndIncluding": "01.01.0011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ntt-west:rt-500mi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0B6E35-3BBB-4859-A5C4-95588D5AD2C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de tipo cross-site scripting en Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR-S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver .7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, RS-500KI versi\u00f3n de firmware Ver.01.00.0070 y anteriores, PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0014 y anteriores, RS-500MI versi\u00f3n de firmware  Ver.03.01.0019 y anteriores, y Hikari Denwa router/Home GateWay proporcionado por NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE versi\u00f3n de firmware Ver. 19.41 y anteriores, PR -S300HI/RT-S300HI/RV-S340HI versi\u00f3n de firmware Ver.19.01.0005 y anteriores, PR-S300SE/RT-S300SE/RV-S340SE versi\u00f3n de firmware Ver.19.40 y anteriores, PR-400NE/RT-400NE/RV-440NE versi\u00f3n de firmware Ver.7.42 y anteriores, PR-400KI/RT-400KI/RV-440KI versi\u00f3n de firmware Ver.07.00.1010 y anteriores, PR-400MI/RT-400MI/RV-440MI versi\u00f3n de firmware Ver. 07.00.1012 y anteriores, PR-500KI/RT-500KI versi\u00f3n de firmware Ver.01.00.0090 y anteriores, y PR-500MI/RT-500MI versi\u00f3n de firmware Ver.01.01.0011 y anteriores), permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores no especificados."
    }
  ],
  "id": "CVE-2019-5985",
  "lastModified": "2024-11-21T04:45:51.350",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-12T17:15:13.920",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN43172719/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}