Show plain JSON{"id": "CVE-2013-3688", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-10-01T19:55:09.367", "references": [{"url": "http://seclists.org/fulldisclosure/2013/Jun/84", "source": "cve@mitre.org"}, {"url": "http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras", "tags": ["Exploit"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The TP-Link IP Cameras TL-SC3171, TL-SC3130, TL-SC3130G, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6, does not properly restrict access to certain administrative functions, which allows remote attackers to (1) cause a denial of service (device reboot) via a request to cgi-bin/reboot or (2) cause a denial of service (reboot and reset to factory defaults) via a request to cgi-bin/hardfactorydefault."}, {"lang": "es", "value": "Las c\u00e1maras IP TP-Link TL-SC3171, TL-SC3130, TL-SC3130G, TL-SC3171G, y posiblemente otros modelos anteriores al firmeware beta LM.1.6.18P12_sign6, no restringen apropiadamente el acceso a determinadas funciones administrativas, lo cual permite a atacantes remotos (1) causar denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s de una petici\u00f3n cgi-bin/reboot o (2) causar denegaci\u00f3n de servicio (reinicio y restauraci\u00f3n a valores de f\u00e1brica por defecto) a trav\u00e9s de una petici\u00f3n cgi-bin/hardfactorydefault."}], "lastModified": "2013-10-04T16:43:25.083", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:tp-link:tl-sc3130:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A687292-110A-44B6-91E0-0FA9AA954D1B"}, {"criteria": "cpe:2.3:h:tp-link:tl-sc3130g:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDCDA0C1-4A25-4BD6-8F8C-875D488295CB"}, {"criteria": "cpe:2.3:h:tp-link:tl-sc3171:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DC0738C-300C-4CD4-BB93-AECC15356CB1"}, {"criteria": "cpe:2.3:h:tp-link:tl-sc3171g:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51BA2347-A4EC-45DF-B05A-7806E62FEC3B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:tp-link:lm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AA9253C-5276-49A9-9097-D9B137829FE8", "versionEndIncluding": "1.6.18p12_sign5"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}