{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T10:42:22.453","vulnerabilities":[{"cve":{"id":"CVE-2021-31578","sourceIdentifier":"security@mediatek.com","published":"2023-02-06T22:15:09.470","lastModified":"2024-11-21T06:05:56.450","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Boa, there is a possible escalation of privilege due to a stack buffer overflow. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: A20210008; Issue ID: OSBNB00123241."},{"lang":"es","value":"En Boa, existe una posible escalada de privilegios debido a un desbordamiento del búfer en la región stack de la memoria. Esto podría conducir a una escalada remota de privilegios por parte de un atacante próximo sin necesidad de privilegios de ejecución adicionales. La interacción del usuario no es necesaria para la explotación. ID de parche: A20210008; ID del problema: OSBNB00123241."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mediatek:en7580_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"tlm7.3.275.0-64","matchCriteriaId":"AFFE9B98-0C16-4EBF-AE99-8163F19FD28C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:en7580:-:*:*:*:*:*:*:*","matchCriteriaId":"061DBB68-80AF-4016-AAE0-EE9DFDFB341B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mediatek:en7528_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"tlm7.3.275.0-64","matchCriteriaId":"D77F5BED-66A1-48F5-B662-A187C1D89E99"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:en7528:-:*:*:*:*:*:*:*","matchCriteriaId":"CD990C82-4C61-479B-A49F-11A3C0812AC5"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-acknowledgements","source":"security@mediatek.com","tags":["Vendor Advisory"]},{"url":"https://corp.mediatek.com/product-security-acknowledgements","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}