Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:genmei_mori:pseudoics:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EB2FE-FB2F-4730-9C91-080CFD887C4C", "vulnerable": true}, {"criteria": "cpe:2.3:a:genmei_mori:pseudoics:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "02721282-985A-4264-9717-EECA324AEF17", "vulnerable": true}, {"criteria": "cpe:2.3:a:genmei_mori:pseudoics:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "11B76356-6958-4080-80A7-BD2CC2D81569", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:zyxel:p-330w_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1C6A04-D7A8-489E-8474-22F56E3FB294", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The UPnP IGD implementation in the Pseudo ICS UPnP software on the ZyXEL P-330W allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an \"external forwarding\" vulnerability."}, {"lang": "es", "value": "La implementaci\u00f3n de UPnP IGD en el programa Pseudo ICS UPnP en el ZyXEL P-330W, permite a atacantes remotos establecer mapas de puertos de su elecci\u00f3n enviando una acci\u00f3n UPnP AddPortMapping en una petici\u00f3n SOAP al interfaz WAN, relacionado con una vulnerabilidad \"external forwarding\"."}], "id": "CVE-2011-4504", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-11-22T11:55:06.013", "references": [{"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/357851"}, {"source": "cve@mitre.org", "url": "http://www.upnp-hacks.org/suspect.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/357851"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.upnp-hacks.org/suspect.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-16"}], "source": "nvd@nist.gov", "type": "Primary"}]}