Show plain JSON{"id": "CVE-2013-4630", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-06-20T15:55:01.070", "references": [{"url": "http://www.exploit-db.com/exploits/25295", "source": "cve@mitre.org"}, {"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.exploit-db.com/exploits/25295", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en los router Huawei AR 150, 200, 1200, 2200, y 3200, cuando el depurado SNMPv3 est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo a trav\u00e9s de peticiones SNMPv3 malformadas."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:huawei:ar_1200:v200r001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91C15137-0BE6-4A8A-BBE4-835CE9D55EED"}, {"criteria": "cpe:2.3:h:huawei:ar_1200:v200r002:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EBC7873-F277-4567-882C-759335670BCE"}, {"criteria": "cpe:2.3:h:huawei:ar_1200:v200r003:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "422CF4F4-DC3F-45A3-9D05-ABF9DE5621AB"}, {"criteria": "cpe:2.3:h:huawei:ar_150:v200r001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC5201F6-1A0C-434A-8A7A-B194A89611A2"}, {"criteria": "cpe:2.3:h:huawei:ar_150:v200r002:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7428959D-CF8A-420E-969B-97EAD38A2FB0"}, {"criteria": "cpe:2.3:h:huawei:ar_150:v200r003:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6307C68F-931C-4D87-9CC1-B3431CAB0C11"}, {"criteria": "cpe:2.3:h:huawei:ar_200:v200r001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E243DC77-196A-4B4A-B2E6-30F4B634F419"}, {"criteria": "cpe:2.3:h:huawei:ar_200:v200r002:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EEED571-6638-464C-AE91-8B8DCBD87A43"}, {"criteria": "cpe:2.3:h:huawei:ar_200:v200r003:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BAD81D8-2385-42CE-A147-7C23AD80A693"}, {"criteria": "cpe:2.3:h:huawei:ar_2200:v200r001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA95EF1E-1309-4348-B1C0-9EF668DF774F"}, {"criteria": "cpe:2.3:h:huawei:ar_2200:v200r002:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EBEFD7D-EA06-4017-A276-8B4741C9C51F"}, {"criteria": "cpe:2.3:h:huawei:ar_2200:v200r003:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90670CC0-1434-4DCA-8D85-0ABCF76C9A1C"}, {"criteria": "cpe:2.3:h:huawei:ar_3200:v200r001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2445F89-743C-4A9A-AEAD-8428F0DC50AE"}, {"criteria": "cpe:2.3:h:huawei:ar_3200:v200r002:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8FE1931-1585-4E9E-971D-1DA89C4ED59A"}, {"criteria": "cpe:2.3:h:huawei:ar_3200:v200r003:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D69F769D-C3B0-459C-92BE-57CA645AFD15"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}