{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:42:52.236","vulnerabilities":[{"cve":{"id":"CVE-2019-20348","sourceIdentifier":"cve@mitre.org","published":"2020-01-06T21:15:11.643","lastModified":"2024-11-21T04:38:17.693","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OKER G232V1 v1.03.02.20161129 devices provide a root terminal on a UART serial interface without proper access control. This allows attackers with physical access to interrupt the boot sequence in order to execute arbitrary commands with root privileges and conduct further attacks."},{"lang":"es","value":"Los dispositivos OKER G232V1 versión v1.03.02.20161129 proporcionan una terminal root en una interfaz serial UART sin el control de acceso apropiado. Esto permite a atacantes con acceso físico interrumpir la secuencia de arranque a fin de ejecutar comandos arbitrarios con privilegios de root y dirigir nuevos ataques."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:okerthai:g232v1_firmware:1.03.02.20161129:*:*:*:*:*:*:*","matchCriteriaId":"A959B4AF-317F-4F6F-A6EC-D2E84487E1BB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:okerthai:g232v1:-:*:*:*:*:*:*:*","matchCriteriaId":"B75AF4C2-7A5B-4B13-96E0-C6575DC76426"}]}]}],"references":[{"url":"https://gist.github.com/tanprathan/24cab2eb02937f86961c6380b47ce385","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://gist.github.com/tanprathan/24cab2eb02937f86961c6380b47ce385","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}