{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T16:31:43.450","vulnerabilities":[{"cve":{"id":"CVE-2017-2113","sourceIdentifier":"vultures@jpcert.or.jp","published":"2017-04-28T16:59:01.107","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in TS-WPTCAM firmware version 1.18 and earlier, TS-WPTCAM2 firmware version 1.00, TS-WLCE firmware version 1.18 and earlier, TS-WLC2 firmware version 1.18 and earlier, TS-WRLC firmware version 1.17 and earlier, TS-PTCAM firmware version 1.18 and earlier, TS-PTCAM/POE firmware version 1.18 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors."},{"lang":"es","value":"Desbordamiento de búfer en el firmaware TS-WPTCAM versión 1.18 y anteriores, TS-WPTCAM2 versión 1.00, TS-WLCE version 1.18 y anteriores, TS-WLC2 versión 1.18 y anteriores, TS-WRLC versión 1.17 y anteriores, TS-PTCAM versión 1.18 y anteriores, TS-PTCAM/POE versión 1.18 y anteriores, que permite a atacantes remotos ejecutar comandos del sistema operativo arbitrarios a través de vectores no especificados."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","baseScore":8.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":6.5,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-ptcam\\/poe_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.18","matchCriteriaId":"696730C5-10E5-4436-B205-1629A8BD13FB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-ptcam\\/poe:-:*:*:*:*:*:*:*","matchCriteriaId":"1B4F165B-E109-4ADB-846B-7C874F7D6B04"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-ptcam_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.18","matchCriteriaId":"43E8CD31-1383-458B-93BA-481CDCB315C6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-ptcam:-:*:*:*:*:*:*:*","matchCriteriaId":"E68F852B-1DCA-4224-9B3D-06DCC4340223"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-wrlc_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.17","matchCriteriaId":"96F7D7E6-B798-407D-8FBA-E71B4134567C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-wrlc:-:*:*:*:*:*:*:*","matchCriteriaId":"B720F530-EA4B-4686-8724-64AAD3B15BEF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-wlc2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.18","matchCriteriaId":"3B1E387F-5413-41C2-A81C-AE75A1A596CD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-wlc2:-:*:*:*:*:*:*:*","matchCriteriaId":"27FE4F7C-0AE3-46E3-AC6E-321316E96707"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-wlce_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.18","matchCriteriaId":"0B9911C3-A738-4631-89C0-F5DE9F656A42"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-wlce:-:*:*:*:*:*:*:*","matchCriteriaId":"621C2B49-73FE-4BA5-96DB-E0583547C71F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-wptcam2_firmware:1.00:*:*:*:*:*:*:*","matchCriteriaId":"8511FD46-66D7-435F-9B99-289D5ECB372C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-wptcam2:-:*:*:*:*:*:*:*","matchCriteriaId":"2DBCAD37-39CB-411B-BADC-3DB54D500CB7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iodata:ts-wptcam_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.18","matchCriteriaId":"4F6422BF-A5CD-4119-B00A-6EFF66CC7FDB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iodata:ts-wptcam:-:*:*:*:*:*:*:*","matchCriteriaId":"1BBBA345-FEDB-46C0-B386-5F8537CF57D9"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN46830433/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.iodata.jp/support/information/2017/camera201702/","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/96620","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://jvn.jp/en/jp/JVN46830433/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.iodata.jp/support/information/2017/camera201702/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/96620","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}