{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:53:16.371","vulnerabilities":[{"cve":{"id":"CVE-2020-14511","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2020-07-15T13:15:10.193","lastModified":"2024-11-21T05:03:25.703","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)."},{"lang":"es","value":"El funcionamiento malicioso de la cookie del navegador web diseñada puede causar un desbordamiento del búfer en la región stack de la memoria en el servidor web del sistema en los Enrutadores de la Serie EDR-G902 y EDR-G903 (versiones anteriores a 5.4)"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4","matchCriteriaId":"181D152B-88C8-46A6-B15A-61C42A8CBF82"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*","matchCriteriaId":"917B2620-0DEE-4AE8-978B-237705CAEBCB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4","matchCriteriaId":"04BE1A05-43ED-40EF-AD8C-6FD52CFA24D0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*","matchCriteriaId":"66893485-6060-432C-8BA7-106CE863A674"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4","matchCriteriaId":"3EC3B876-CAD2-46DE-A243-24E12C10F1B0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*","matchCriteriaId":"B390870B-F5C9-4F31-B19F-A81843C68DBA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4","matchCriteriaId":"85C9724D-AE5A-4598-AE3E-9287DC54C4EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*","matchCriteriaId":"FDB89B47-4598-4F6D-951F-DF546C8CAA96"}]}]}],"references":[{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}