Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*", "matchCriteriaId": "B9B37DD5-40E7-43E3-8183-A755C488E383", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*", "matchCriteriaId": "D2850459-830C-49FD-89F8-0693E6D33543", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C98B6-E370-4E2C-988D-CC3F3AA78126", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*", "matchCriteriaId": "AC9ED360-9257-477C-8F21-0CD4C1D38F42", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*", "matchCriteriaId": "B170D9D8-4A01-4A97-947C-F978B07045C2", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*", "matchCriteriaId": "9D759579-E9E7-4344-BA88-CACECFB9C731", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*", "matchCriteriaId": "35DB7E44-E00E-41E3-A701-FB5DAC8E48E1", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*", "matchCriteriaId": "2344FB7D-785D-4C52-BF27-1EEAAB2726B8", "vulnerable": true}, {"criteria": "cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*", "matchCriteriaId": "CEA7FE7B-31E2-4164-882B-2E9712F95044", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack."}, {"lang": "es", "value": "Los routers ZyXEL Prestige, incluyendo los modelos P-660, P-661 y P-662 con firmware 3.40(PE9) y 3.40(AGD.2) hasta la 3.40(AHQ.3), soportan autenticaci\u00f3n sobre HTML a trav\u00e9s de una cadena hash en el campo hiddenPassword, lo cual permite a atacantes remotos obtener acceso mediante un ataque por repetici\u00f3n."}], "id": "CVE-2008-1527", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2008-03-26T10:44:00.000", "references": [{"source": "cve@mitre.org", "url": "http://www.gnucitizen.org/projects/router-hacking-challenge/"}, {"source": "cve@mitre.org", "url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gnucitizen.org/projects/router-hacking-challenge/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-310"}], "source": "nvd@nist.gov", "type": "Primary"}]}