{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T10:11:41.262","vulnerabilities":[{"cve":{"id":"CVE-2017-5544","sourceIdentifier":"cve@mitre.org","published":"2017-01-23T07:59:00.547","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered on FiberHome Fengine S5800 switches V210R240. An unauthorized attacker can access the device's SSH service, using a password cracking tool to establish SSH connections quickly. This will trigger an increase in the SSH login timeout (each of the login attempts will occupy a connection slot for a longer time). Once this occurs, legitimate login attempts via SSH/telnet will be refused, resulting in a denial of service; you must restart the device."},{"lang":"es","value":"Un problema fue descubierto en los switches FiberHome Fengine S5800 V210R240. Un atacante no autorizado puede acceder al servicio SSH del dispositivo, utilizando una herramienta de craqueo de contraseñas para establecer rápidamente conexiones SSH. Esto desencadenará un incremento en el tiempo de espera en el inicio de sesión SSH (cada un de los intentos de inicio de sesión ocupará una ranura de conexión durante un tiempo mayor). Una vez que esto ocurra, los intentos de inicio de sesión legítimos a través de SSH/telnet serán rechazados, resultando en una denegación de servicio; debe reiniciar el dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fiberhome:fengine_s5800_firmware:v210r240:*:*:*:*:*:*:*","matchCriteriaId":"C4C4C2BB-CB68-47EA-A125-7DECA73630D3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fiberhome:fengine_28f-s:-:*:*:*:*:*:*:*","matchCriteriaId":"FDA77F7F-59F0-4E9A-A6FA-55E6710D58EA"},{"vulnerable":false,"criteria":"cpe:2.3:h:fiberhome:fengine_52f-s:-:*:*:*:*:*:*:*","matchCriteriaId":"BA8E0A26-FF86-43F3-9D33-EF0B5648403C"},{"vulnerable":false,"criteria":"cpe:2.3:h:fiberhome:fengine_52t-s:-:*:*:*:*:*:*:*","matchCriteriaId":"C61388D1-E384-4DFF-89FF-72CA6B22AD9D"},{"vulnerable":false,"criteria":"cpe:2.3:h:fiberhome:fengine_s5800-28t-s:-:*:*:*:*:*:*:*","matchCriteriaId":"F5C5E8A6-8404-4F29-BC42-99AEB3DF91AC"},{"vulnerable":false,"criteria":"cpe:2.3:h:fiberhome:fengine_s5800-28t-s-pe:-:*:*:*:*:*:*:*","matchCriteriaId":"35DEF0C7-1261-498F-AB16-9078806F856E"}]}]}],"references":[{"url":"http://www.nfcwar.com","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/95708","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.nfcwar.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/95708","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}