Search criteria

12 vulnerabilities found for seil\/x86 by iij

VAR-201406-0099

Vulnerability from variot - Updated: 2025-04-13 23:21

The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. The following are vulnerable: SEIL/x86 1.00 to 3.10 SEIL/X1 1.00 to 4.50 SEIL/X2 1.00 to 4.50 SEIL/B1 1.00 to 4.50 SEIL/Turbo 1.80 to 2.17 SEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0099",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.82"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.50"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.50"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.17"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.17"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.10"
      },
      {
        "model": "seil/neu 2fe plus to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.802.17"
      },
      {
        "model": "seil/turbo to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.802.17"
      },
      {
        "model": "seil/b1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x2 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x86 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.003.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fneu_2fe_plus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fturbo",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx86",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "68041"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-2004",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-2004",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2014-000055",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-03732",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-69943",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-2004",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2014-000055",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-03732",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201406-323",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-69943",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. \nThe following are vulnerable:\nSEIL/x86 1.00 to 3.10\nSEIL/X1 1.00 to 4.50\nSEIL/X2 1.00 to 4.50\nSEIL/B1 1.00 to 4.50\nSEIL/Turbo 1.80 to 2.17\nSEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVN10724763",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "68041",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "id": "VAR-201406-0099",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      }
    ],
    "trust": 1.1894899984615384
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:21:26.353000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01443.html"
      },
      {
        "title": "SEIL Series Routers patch for remote denial of service vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/46479"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn10724763/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01443.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000055"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2004"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2004"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/68041"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "date": "2014-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "BID",
        "id": "68041"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "date": "2014-06-16T14:55:05.893000",
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "date": "2014-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "BID",
        "id": "68041"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ],
    "trust": 0.6
  }
}

VAR-201309-0394

Vulnerability from variot - Updated: 2025-04-11 23:14

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan's SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data Attackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0394",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.05 to 2.15"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.05 to 2.15"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.81"
      },
      {
        "model": "seil/neu 2fe plus to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "2.052.15"
      },
      {
        "model": "seil/turbo to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "2.052.15"
      },
      {
        "model": "seil/b1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x2 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x86 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.002.81"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.05"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.05"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x86",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.82"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.81"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fneu_2fe_plus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fturbo",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx86",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62593"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4709",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-4709",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000092",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-13230",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-64711",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4709",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000092",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13230",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201309-351",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64711",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan\u0027s SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow  vulnerability because they fails to sufficiently bounds check user-supplied data\nAttackers can exploit this issue to execute  arbitrary code in context of the  affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092",
        "trust": 2.8
      },
      {
        "db": "JVN",
        "id": "JVN43152129",
        "trust": 2.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#43152129",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "62593",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "id": "VAR-201309-0394",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      }
    ],
    "trust": 1.1692246653333331
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:14:41.938000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01396.html"
      },
      {
        "title": "Patch for SEIL Series Router PPPACL L2TP Message Processing Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/39771"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.seil.jp/support/security/a01396.html"
      },
      {
        "trust": 2.0,
        "url": "http://jvn.jp/en/jp/jvn43152129/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000092"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4709"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/en/jp/jvn43152129/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=http://support.apple.com/kb/cve-2013-4709"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/download/firmware/"
      },
      {
        "trust": 0.3,
        "url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000092.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62593"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "date": "2013-09-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "date": "2013-09-20T15:26:04.230000",
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "date": "2015-03-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62593"
      },
      {
        "date": "2013-09-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "date": "2014-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ],
    "trust": 0.6
  }
}

VAR-201103-0115

Vulnerability from variot - Updated: 2025-04-11 23:07

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------

Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).

http://secunia.com/company/events/mms_2011/


TITLE: SEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA43494

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43494/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

RELEASE DATE: 2011-03-18

DISCUSS ADVISORY: http://secunia.com/advisories/43494/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/43494/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in SEIL Routers, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is reported in the following products: * SEIL/x86 firmware 1.00 to 1.61. * SEIL/B1 firmware 1.00 to 3.11. * SEIL/X1 firmware 1.00 to 3.11. * SEIL/X2 firmware 1.00 to 3.11. * SEIL/Turbo firmware 1.80 to 2.10.

SOLUTION: Update to a patched version.

Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.seil.jp/support/security/a01001.html

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201103-0115",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.61"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.10"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.10"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 1.61"
      },
      {
        "model": "turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor",
    "sources": [
      {
        "db": "BID",
        "id": "46598"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-0454",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2011-0454",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 8.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2011-000014",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "VHN-48399",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-0454",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2011-000014",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201103-009",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-48399",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow  vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA43494\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43494/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nRELEASE DATE:\n2011-03-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43494/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43494/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL Routers, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is reported in the following products:\n* SEIL/x86 firmware 1.00 to 1.61. \n* SEIL/B1 firmware 1.00 to 3.11. \n* SEIL/X1 firmware 1.00 to 3.11. \n* SEIL/X2 firmware 1.00 to 3.11. \n* SEIL/Turbo firmware 1.80 to 2.10. \n\nSOLUTION:\nUpdate to a patched version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.seil.jp/support/security/a01001.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN88991166",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454",
        "trust": 3.4
      },
      {
        "db": "SECUNIA",
        "id": "43494",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "46598",
        "trust": 2.2
      },
      {
        "db": "XF",
        "id": "65672",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#88991166",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "99440",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "id": "VAR-201103-0115",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      }
    ],
    "trust": 1.19500407
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:07:34.698000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a01001(Japanese)",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01001.html"
      },
      {
        "title": "Patch for SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/3112"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/43494"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/46598"
      },
      {
        "trust": 1.8,
        "url": "http://www.seil.jp/support/security/a01001.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn88991166/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2011-000014"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0454"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/english/vuln/201102_seil_en.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/65672"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/en/jp/jvn88991166"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0454"
      },
      {
        "trust": 0.6,
        "url": "http://jvn.jp/jp/jvn88991166/index.htmlhttp"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/jp/jvn88991166/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/download/firmware/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/events/mms_2011/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43494/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43494/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "date": "2011-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "BID",
        "id": "46598"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "date": "2011-03-18T07:48:13",
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "date": "2011-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "date": "2011-03-01T23:00:02.800000",
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "BID",
        "id": "46598"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "date": "2011-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ],
    "trust": 0.6
  }
}

VAR-201310-0458

Vulnerability from variot - Updated: 2025-04-11 23:07

The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. Attackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. The following products are vulnerable: SEIL/x86 1.00 through 2.81 SEIL/X1 1.00 through 4.31 SEIL/X2 1.00 through 4.31 SEIL/B1 1.00 through 4.31 SEIL/Turbo 2.05 through 2.15 SEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0458",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.15"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.15"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.80"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.81"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.80"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fneu_2fe_plus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fturbo",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx86",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62612"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4708",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2013-4708",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000091",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-13386",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-64710",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4708",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000091",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13386",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201309-504",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64710",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. \nAttackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. \nThe following products are vulnerable:\nSEIL/x86 1.00 through 2.81\nSEIL/X1 1.00 through 4.31\nSEIL/X2 1.00 through 4.31\nSEIL/B1 1.00 through 4.31\nSEIL/Turbo 2.05 through 2.15\nSEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN40079308",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "97619",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "62612",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504",
        "trust": 0.7
      },
      {
        "db": "SECUNIA",
        "id": "54818",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#40079308",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "id": "VAR-201310-0458",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      }
    ],
    "trust": 1.240005232857143
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:07:15.743000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01388.html"
      },
      {
        "title": "SEIL Multiple Products RADIUS Verification Random Number Generation Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/39884"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.seil.jp/support/security/a01388.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn40079308/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/ja/contents/2013/jvndb-2013-000091.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/97619"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4708"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/en/jp/jvn40079308/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4708"
      },
      {
        "trust": 0.6,
        "url": "http://www.secunia.com/advisories/54818/"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/62612"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/jp/jvn40079308/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "date": "2013-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62612"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "date": "2013-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "date": "2013-10-01T17:55:03.647000",
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "date": "2013-10-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62612"
      },
      {
        "date": "2013-10-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "date": "2014-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable in RADIUS authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ],
    "trust": 0.6
  }
}

CVE-2014-2004 (GCVE-0-2014-2004)

Vulnerability from nvd – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01443.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN10724763/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.188Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01443.html"
          },
          {
            "name": "JVN#10724763",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
          },
          {
            "name": "JVNDB-2014-000055",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01443.html"
        },
        {
          "name": "JVN#10724763",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
        },
        {
          "name": "JVNDB-2014-000055",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-2004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01443.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01443.html"
            },
            {
              "name": "JVN#10724763",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
            },
            {
              "name": "JVNDB-2014-000055",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-2004",
    "datePublished": "2014-06-16T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4708 (GCVE-0-2013-4708)

Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01388.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN40079308/index.html third-party-advisoryx_refsource_JVN
http://osvdb.org/97619 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01388.html"
          },
          {
            "name": "JVN#40079308",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
          },
          {
            "name": "97619",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/97619"
          },
          {
            "name": "JVNDB-2013-000091",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T17:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01388.html"
        },
        {
          "name": "JVN#40079308",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
        },
        {
          "name": "97619",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/97619"
        },
        {
          "name": "JVNDB-2013-000091",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01388.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01388.html"
            },
            {
              "name": "JVN#40079308",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
            },
            {
              "name": "97619",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/97619"
            },
            {
              "name": "JVNDB-2013-000091",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4708",
    "datePublished": "2013-10-01T17:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-17T01:15:57.609Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4709 (GCVE-0-2013-4709)

Vulnerability from nvd – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN43152129/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01396.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#43152129",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01396.html"
          },
          {
            "name": "JVNDB-2013-000092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-20T15:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#43152129",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01396.html"
        },
        {
          "name": "JVNDB-2013-000092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#43152129",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01396.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01396.html"
            },
            {
              "name": "JVNDB-2013-000092",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4709",
    "datePublished": "2013-09-20T15:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:58:50.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from nvd – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2004 (GCVE-0-2014-2004)

Vulnerability from cvelistv5 – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01443.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN10724763/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.188Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01443.html"
          },
          {
            "name": "JVN#10724763",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
          },
          {
            "name": "JVNDB-2014-000055",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01443.html"
        },
        {
          "name": "JVN#10724763",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
        },
        {
          "name": "JVNDB-2014-000055",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-2004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01443.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01443.html"
            },
            {
              "name": "JVN#10724763",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
            },
            {
              "name": "JVNDB-2014-000055",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-2004",
    "datePublished": "2014-06-16T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4708 (GCVE-0-2013-4708)

Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01388.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN40079308/index.html third-party-advisoryx_refsource_JVN
http://osvdb.org/97619 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01388.html"
          },
          {
            "name": "JVN#40079308",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
          },
          {
            "name": "97619",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/97619"
          },
          {
            "name": "JVNDB-2013-000091",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T17:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01388.html"
        },
        {
          "name": "JVN#40079308",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
        },
        {
          "name": "97619",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/97619"
        },
        {
          "name": "JVNDB-2013-000091",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01388.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01388.html"
            },
            {
              "name": "JVN#40079308",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
            },
            {
              "name": "97619",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/97619"
            },
            {
              "name": "JVNDB-2013-000091",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4708",
    "datePublished": "2013-10-01T17:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-17T01:15:57.609Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4709 (GCVE-0-2013-4709)

Vulnerability from cvelistv5 – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN43152129/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01396.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#43152129",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01396.html"
          },
          {
            "name": "JVNDB-2013-000092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-20T15:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#43152129",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01396.html"
        },
        {
          "name": "JVNDB-2013-000092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#43152129",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01396.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01396.html"
            },
            {
              "name": "JVNDB-2013-000092",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4709",
    "datePublished": "2013-09-20T15:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:58:50.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}