{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:38:25.211","vulnerabilities":[{"cve":{"id":"CVE-2017-17222","sourceIdentifier":"psirt@huawei.com","published":"2018-03-09T17:29:01.283","lastModified":"2024-11-21T03:17:41.567","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Import Language Package function in Huawei eSpace 7950 V200R003C30; eSpace 8950 V200R003C00; V200R003C30 has a remote code execution vulnerability. An authenticated, remote attacker can craft and send the packets to the affected products after Language Package is uploaded. Due to insufficient verification of the packets, this could be exploited to execute arbitrary code."},{"lang":"es","value":"La función Import Language Package en Huawei eSpace 7950 V200R003C30 y eSpace 8950 V200R003C00 y V200R003C30 tiene una vulnerabilidad de ejecución remota de código. Un atacante remoto autenticado puede manipular y enviar los paquetes a los productos afectados una vez se haya subido el Language Package. Dada la verificación insuficiente de los paquetes, esto podría explotarse para ejecutar código arbitrario."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_7950_firmware:v200r003c30:*:*:*:*:*:*:*","matchCriteriaId":"4523A712-FF77-4BDA-B213-0AE2BDC4152C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:espace_7950:-:*:*:*:*:*:*:*","matchCriteriaId":"185783AE-3135-471E-8D55-4BAB3A187F21"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_8950_firmware:v200r003c00:*:*:*:*:*:*:*","matchCriteriaId":"72548F60-D6B8-4498-8668-9074A706C3A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:espace_8950_firmware:v200r003c30:*:*:*:*:*:*:*","matchCriteriaId":"6E0B1E39-ACEB-44FB-BDDE-F3856CF6137A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:espace_8950:-:*:*:*:*:*:*:*","matchCriteriaId":"D8BFC4FD-DC7A-47E9-BC06-86F11E2211AE"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180131-01-espace-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180131-01-espace-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}