Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*", "matchCriteriaId": "B9B37DD5-40E7-43E3-8183-A755C488E383", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*", "matchCriteriaId": "D2850459-830C-49FD-89F8-0693E6D33543", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C98B6-E370-4E2C-988D-CC3F3AA78126", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*", "matchCriteriaId": "AC9ED360-9257-477C-8F21-0CD4C1D38F42", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*", "matchCriteriaId": "B170D9D8-4A01-4A97-947C-F978B07045C2", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*", "matchCriteriaId": "9D759579-E9E7-4344-BA88-CACECFB9C731", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*", "matchCriteriaId": "35DB7E44-E00E-41E3-A701-FB5DAC8E48E1", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*", "matchCriteriaId": "2344FB7D-785D-4C52-BF27-1EEAAB2726B8", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*", "matchCriteriaId": "CEA7FE7B-31E2-4164-882B-2E9712F95044", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The default SNMP configuration on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has a Trusted Host value of 0.0.0.0, which allows remote attackers to send SNMP requests from any source IP address."}, {"lang": "es", "value": "La configuraci\u00f3n SNMP por defecto de los routers ZyXEL Prestige, incluyendo los modelos P-660 y P-661 con firmware 3.40(AGD.2) hasta la 3.40(AHQ.3), tienen un valor Trusted Host 0.0.0.0, lo cual permite a atacantes remotos enviar peticiones SNMP desde cualquier direcci\u00f3n IP de origen."}], "id": "CVE-2008-1525", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2008-03-26T10:44:00.000", "references": [{"source": "cve@mitre.org", "url": "http://www.gnucitizen.org/projects/router-hacking-challenge/"}, {"source": "cve@mitre.org", "url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gnucitizen.org/projects/router-hacking-challenge/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-16"}], "source": "nvd@nist.gov", "type": "Primary"}]}