{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T08:03:20.893","vulnerabilities":[{"cve":{"id":"CVE-2020-7847","sourceIdentifier":"vuln@krcert.or.kr","published":"2021-02-23T16:15:13.130","lastModified":"2024-11-21T05:37:54.537","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ipTIME NAS product allows an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. This issue affects: pTIME NAS 1.4.36."},{"lang":"es","value":"El producto ipTIME NAS, permite una vulnerabilidad de carga de archivos arbitraria en la funcionalidad Manage Bulletins/Upload, que puede ser aprovechada para conseguir una ejecución de código remota.&#xa0;Este problema afecta a: ipTIME NAS versión 1.4.36"}],"metrics":{"cvssMetricV31":[{"source":"vuln@krcert.or.kr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P","baseScore":5.2,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":5.1,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vuln@krcert.or.kr","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas-i_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"CF3C2081-9C14-4EA8-9918-B90E1BE5DBA8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas-i:-:*:*:*:*:*:*:*","matchCriteriaId":"CBE26B68-CC6F-4ABE-818A-8872A0753DC6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas-ii_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"EF803047-1BB7-46DE-97AB-865C7957067F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas-ii:-:*:*:*:*:*:*:*","matchCriteriaId":"8C101E48-A4C0-418A-9FBD-AF6B9115B0A9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas-iie_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"EE3227D2-C847-4437-86C5-586B9F2F6646"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas-iie:-:*:*:*:*:*:*:*","matchCriteriaId":"6B6F0961-E444-4519-BC03-9BFADEDF73EE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas101_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"31A2CB20-D231-4B47-A9F3-0BC08631ABE0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas101:-:*:*:*:*:*:*:*","matchCriteriaId":"B46EE9BB-2CA6-49E1-BB46-9621805C89A0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas1dual_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"0AEECE18-E0EA-4394-9A57-EB97E2AE8DD2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas1dual:-:*:*:*:*:*:*:*","matchCriteriaId":"2ACEC464-70B3-452B-A1A3-594C697E3AB3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas2dual_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"8153E181-7934-4868-BE82-C30B6CD7C317"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas2dual:-:*:*:*:*:*:*:*","matchCriteriaId":"271D21D5-A55E-4D4F-8473-5A7A67573DEA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"7A19466B-817D-444C-8E83-9448621C0B4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas3:-:*:*:*:*:*:*:*","matchCriteriaId":"409E183B-5919-48FF-A121-EB89E58D1956"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas4_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"DB48A461-FC97-4021-991B-141DF49B9870"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas4:-:*:*:*:*:*:*:*","matchCriteriaId":"5681FB7D-A7F5-48F1-AE10-79F5B64081E5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas4dual_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.36","matchCriteriaId":"460ECDE2-268E-499A-B9B2-580EE221D85A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas4dual:-:*:*:*:*:*:*:*","matchCriteriaId":"0429CC1A-B95C-4FB0-90D6-D6CAD8E1CC14"}]}]}],"references":[{"url":"https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35921","source":"vuln@krcert.or.kr","tags":["Third Party Advisory"]},{"url":"https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35921","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}