{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T19:26:34.007","vulnerabilities":[{"cve":{"id":"CVE-2021-21747","sourceIdentifier":"psirt@zte.com.cn","published":"2021-10-20T15:15:07.727","lastModified":"2024-11-21T05:48:55.833","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information."},{"lang":"es","value":"El producto ZTE MF971R presenta una vulnerabilidad de tipo XSS reflexiva. Un atacante podría usar la vulnerabilidad para conseguir información de las cookies"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:*","matchCriteriaId":"72A4F659-C656-47D6-B38E-5BA8E73DCD30"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*","matchCriteriaId":"9A7F54F4-E324-4D1E-839E-677396BAFE49"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:mf971r_firmware:1v1.0.0b06:*:*:*:*:*:*:*","matchCriteriaId":"35FA4400-636F-48E7-AF1E-9416D9E9386F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*","matchCriteriaId":"9A7F54F4-E324-4D1E-839E-677396BAFE49"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:mf971r_firmware:2v1.0.0b03:*:*:*:*:*:*:*","matchCriteriaId":"252BBFAA-0053-441A-8F20-A737EF573355"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*","matchCriteriaId":"9A7F54F4-E324-4D1E-839E-677396BAFE49"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:mf971r_firmware:s2v1.0.0b03:*:*:*:*:*:*:*","matchCriteriaId":"7B066F08-DDC4-4868-8FD2-620E46660B64"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*","matchCriteriaId":"9A7F54F4-E324-4D1E-839E-677396BAFE49"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zte:mf971r_firmware:sv1.0.0b05:*:*:*:*:*:*:*","matchCriteriaId":"AAA1BD70-DC47-4B81-A906-3FD76E593F75"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*","matchCriteriaId":"9A7F54F4-E324-4D1E-839E-677396BAFE49"}]}]}],"references":[{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1019764","source":"psirt@zte.com.cn","tags":["Vendor Advisory"]},{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1019764","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}