{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T02:26:41.647","vulnerabilities":[{"cve":{"id":"CVE-2021-21729","sourceIdentifier":"psirt@zte.com.cn","published":"2021-04-13T16:15:12.373","lastModified":"2024-11-21T05:48:53.660","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1"},{"lang":"es","value":"Algunos productos ZTE presentan una vulnerabilidad de tipo CSRF.&#xa0;Debido a que algunas páginas presentan un fallo de verificación de valor aleatorio de CSRF, atacantes podrían llevar a cabo operaciones de autorización ilegales mediante la construcción de mensajes. Esto afecta a: ZXHN H168N versión V3.5.0_EG1T5_TE, versión V2.5.5, ZXHN H108N V2.5.5_BTMT1"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"},{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:zxhn_h168n_firmware:3.5.0_eg1t5_te:*:*:*:*:*:*:*","matchCriteriaId":"504FD446-1E1A-45DD-AB20-38C665AB4E4E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:zxhn_h168n:-:*:*:*:*:*:*:*","matchCriteriaId":"391EB61C-0A7B-48A6-8BBD-944C848ACD10"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:zxhn_h108n_firmware:2.5.5_btmt1:*:*:*:*:*:*:*","matchCriteriaId":"02F52956-9DFE-4FB6-887D-130E762237DA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:zxhn_h108n:-:*:*:*:*:*:*:*","matchCriteriaId":"6094FC9D-0E19-499B-8D3E-7C1BF5D7FEBD"}]}]}],"references":[{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014904","source":"psirt@zte.com.cn","tags":["Vendor Advisory"]},{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014904","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}