{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T00:32:07.801","vulnerabilities":[{"cve":{"id":"CVE-2021-31573","sourceIdentifier":"security@mediatek.com","published":"2023-02-06T22:15:09.217","lastModified":"2025-03-26T15:15:36.763","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Config Manager, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: A20210009; Issue ID: OSBNB00123234."},{"lang":"es","value":"En Config Manager, existe una posible inyección de comando debido a una validación de entrada incorrecta. Esto podría conducir a una escalada remota de privilegios por parte de un atacante próximo sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación. ID de parche: A20210009; ID del problema: OSBNB00123234."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mediatek:en7580_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"tlm7.3.275.0-82","matchCriteriaId":"7CA71010-AB02-4144-BEAD-78E3E2083242"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:en7580:-:*:*:*:*:*:*:*","matchCriteriaId":"061DBB68-80AF-4016-AAE0-EE9DFDFB341B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mediatek:en7528_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"tlm7.3.275.0-82","matchCriteriaId":"F6E9A131-DCCC-406C-9134-E026D14E5D34"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:en7528:-:*:*:*:*:*:*:*","matchCriteriaId":"CD990C82-4C61-479B-A49F-11A3C0812AC5"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-acknowledgements","source":"security@mediatek.com","tags":["Vendor Advisory"]},{"url":"https://corp.mediatek.com/product-security-acknowledgements","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}