Search criteria
1 vulnerability found for nr8250 by zte
VAR-201709-0216
Vulnerability from variot - Updated: 2025-04-20 23:32All versions prior to V12.17.20 of the ZTE Microwave NR8000 series products - NR8120, NR8120A, NR8120, NR8150, NR8250, NR8000 TR and NR8950 are the applications of C/S architecture using the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host. ZTE Microwave NR8000 Series products are vulnerable to unreliable data deserialization.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE Microwave NR8120 and others are microwave transmission solutions of China ZTE Corporation.
There are security holes in ZTE Microwave NR8000 series products. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. The following products and versions are affected: ZTE Microwave NR8120 earlier than V12.17.20; NR8120A earlier than V12.17.20; NR8120 earlier than V12.17.20; NR8150 earlier than V12.17.20; Versions earlier than TR V12.17.20; versions earlier than NR8950 V12.17.20
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201709-0216",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nr8120",
"scope": "lt",
"trust": 1.8,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8120a",
"scope": "lt",
"trust": 1.8,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8150",
"scope": "lt",
"trust": 1.8,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8250",
"scope": "lt",
"trust": 1.8,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8950",
"scope": "lt",
"trust": 1.8,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8000tr",
"scope": "lt",
"trust": 1.0,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8000 tr",
"scope": "lt",
"trust": 0.8,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "microwave nr8120",
"scope": "lte",
"trust": 0.6,
"vendor": "zte",
"version": "\u003c=v12.17.20"
},
{
"model": "nr8120a",
"scope": "lte",
"trust": 0.6,
"vendor": "zte",
"version": "\u003c=v12.17.20"
},
{
"model": "nr8120",
"scope": "lte",
"trust": 0.6,
"vendor": "zte",
"version": "\u003c=v12.17.20"
},
{
"model": "nr8150",
"scope": "lte",
"trust": 0.6,
"vendor": "zte",
"version": "\u003c=v12.17.20"
},
{
"model": "nr8250",
"scope": "lt",
"trust": 0.6,
"vendor": "zte",
"version": "v12.17.20"
},
{
"model": "nr8000 tr",
"scope": "lt",
"trust": 0.6,
"vendor": "zte",
"version": "v12.17.20"
},
{
"model": "nr8950",
"scope": "lt",
"trust": 0.6,
"vendor": "zte",
"version": "v12.17.20"
},
{
"model": "nr8150",
"scope": "eq",
"trust": 0.6,
"vendor": "zte",
"version": null
},
{
"model": "nr8000tr",
"scope": "eq",
"trust": 0.6,
"vendor": "zte",
"version": null
},
{
"model": "nr8950",
"scope": "eq",
"trust": 0.6,
"vendor": "zte",
"version": null
},
{
"model": "nr8120",
"scope": "eq",
"trust": 0.6,
"vendor": "zte",
"version": null
},
{
"model": "nr8120a",
"scope": "eq",
"trust": 0.6,
"vendor": "zte",
"version": null
},
{
"model": "nr8250",
"scope": "eq",
"trust": 0.6,
"vendor": "zte",
"version": null
},
{
"model": "nr8950",
"scope": "eq",
"trust": 0.3,
"vendor": "zte",
"version": "0"
},
{
"model": "nr8250",
"scope": "eq",
"trust": 0.3,
"vendor": "zte",
"version": "0"
},
{
"model": "nr8150",
"scope": "eq",
"trust": 0.3,
"vendor": "zte",
"version": "0"
},
{
"model": "nr8120a",
"scope": "eq",
"trust": 0.3,
"vendor": "zte",
"version": "0"
},
{
"model": "nr8120",
"scope": "eq",
"trust": 0.3,
"vendor": "zte",
"version": "0"
},
{
"model": "nr8000 tr",
"scope": "eq",
"trust": 0.3,
"vendor": "zte",
"version": "0"
},
{
"model": "nr8950",
"scope": "ne",
"trust": 0.3,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8250",
"scope": "ne",
"trust": 0.3,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8150",
"scope": "ne",
"trust": 0.3,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8120a",
"scope": "ne",
"trust": 0.3,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8120",
"scope": "ne",
"trust": 0.3,
"vendor": "zte",
"version": "12.17.20"
},
{
"model": "nr8000 tr",
"scope": "ne",
"trust": 0.3,
"vendor": "zte",
"version": "12.17.20"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "BID",
"id": "101075"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:zte:nr8000tr_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:zte:nr8120_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:zte:nr8120a_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:zte:nr8150_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:zte:nr8250_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:zte:nr8950_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Zhang Jinxin",
"sources": [
{
"db": "BID",
"id": "101075"
}
],
"trust": 0.3
},
"cve": "CVE-2017-10932",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2017-10932",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-30056",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-101304",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-10932",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-10932",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-10932",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-10932",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-30056",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201709-1278",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-101304",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2017-10932",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "VULHUB",
"id": "VHN-101304"
},
{
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "All versions prior to V12.17.20 of the ZTE Microwave NR8000 series products - NR8120, NR8120A, NR8120, NR8150, NR8250, NR8000 TR and NR8950 are the applications of C/S architecture using the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host. ZTE Microwave NR8000 Series products are vulnerable to unreliable data deserialization.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE Microwave NR8120 and others are microwave transmission solutions of China ZTE Corporation. \n\nThere are security holes in ZTE Microwave NR8000 series products. \nSuccessfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. The following products and versions are affected: ZTE Microwave NR8120 earlier than V12.17.20; NR8120A earlier than V12.17.20; NR8120 earlier than V12.17.20; NR8150 earlier than V12.17.20; Versions earlier than TR V12.17.20; versions earlier than NR8950 V12.17.20",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-10932"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "BID",
"id": "101075"
},
{
"db": "VULHUB",
"id": "VHN-101304"
},
{
"db": "VULMON",
"id": "CVE-2017-10932"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-10932",
"trust": 3.5
},
{
"db": "ZTE",
"id": "1008422",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-30056",
"trust": 0.6
},
{
"db": "BID",
"id": "101075",
"trust": 0.5
},
{
"db": "VULHUB",
"id": "VHN-101304",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-10932",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "VULHUB",
"id": "VHN-101304"
},
{
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"db": "BID",
"id": "101075"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"id": "VAR-201709-0216",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-101304"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-20T23:32:50.717000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Remote Code Execution Vulnerability in NR8000 Series Products",
"trust": 0.8,
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008422"
},
{
"title": "Patch for ZTE Microwave NR8000 Series Remote Code Execution Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/103614"
},
{
"title": "ZTE Microwave NR8000 Repair measures for series product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75177"
},
{
"title": "Java-Deserialization-CVEs",
"trust": 0.1,
"url": "https://github.com/PalindromeLabs/Java-Deserialization-CVEs "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-502",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-101304"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "http://support.zte.com.cn/support/news/loopholeinfodetail.aspx?newsid=1008422"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10932"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-10932"
},
{
"trust": 0.3,
"url": "http://wwwen.zte.com.cn/en/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/502.html"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/101075"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/palindromelabs/java-deserialization-cves"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "VULHUB",
"id": "VHN-101304"
},
{
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"db": "BID",
"id": "101075"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"db": "VULHUB",
"id": "VHN-101304"
},
{
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"db": "BID",
"id": "101075"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"date": "2017-09-28T00:00:00",
"db": "VULHUB",
"id": "VHN-101304"
},
{
"date": "2017-09-28T00:00:00",
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"date": "2017-09-15T00:00:00",
"db": "BID",
"id": "101075"
},
{
"date": "2017-10-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"date": "2017-09-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"date": "2017-09-28T01:29:00.997000",
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-30056"
},
{
"date": "2017-10-11T00:00:00",
"db": "VULHUB",
"id": "VHN-101304"
},
{
"date": "2017-10-11T00:00:00",
"db": "VULMON",
"id": "CVE-2017-10932"
},
{
"date": "2017-09-15T00:00:00",
"db": "BID",
"id": "101075"
},
{
"date": "2017-10-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-008630"
},
{
"date": "2017-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-1278"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-10932"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ZTE Microwave NR8000 Vulnerability related to unreliable data deserialization in series products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-008630"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-1278"
}
],
"trust": 0.6
}
}