Show plain JSON{"id": "CVE-2017-11456", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": true, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2017-07-19T07:29:00.627", "references": [{"url": "https://blogs.securiteam.com/index.php/archives/3317#more-3317", "tags": ["Exploit", "Technical Description"], "source": "cve@mitre.org"}, {"url": "https://blogs.securiteam.com/index.php/archives/3317#more-3317", "tags": ["Exploit", "Technical Description"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Geneko GWR routers allow directory traversal sequences starting with a /../ substring, as demonstrated by unauthenticated read access to the configuration file."}, {"lang": "es", "value": "Los enrutadores GWR de Geneko permiten secuencias de salto de directorios arrancando con una subcadena /../, como es demostrado por el acceso de lectura no autenticado en el archivo de configuraci\u00f3n."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:geneko:gwr352_3g_router_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAEF2807-20CA-4C38-BBEA-A7C6DB3CAC07"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:geneko:gwr352_3g_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "705B0D7C-5192-49AD-8C5F-BF091773A898"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:geneko:gwr352wv_wide_voltage_3g_router_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9343D32-F84D-4EBF-AE3F-756145F60C07"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:geneko:gwr352wv_wide_voltage_3g_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DDBEF4A2-3466-4F58-A2AE-9517DF055F8D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:geneko:gwr252_edge_router_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF12B26C-5503-4BFD-B453-8806AE6F51BB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:geneko:gwr252_edge_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9ED2C10E-6E61-4705-9ADC-FFFEF938BDB0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:geneko:gwr202_gprs_router_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D01AB59E-A71A-47CC-B2A6-447677EFD47F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:geneko:gwr202_gprs_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "73FB4180-4378-4918-8B56-050E21B42C8A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}