{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:19:20.023","vulnerabilities":[{"cve":{"id":"CVE-2022-23765","sourceIdentifier":"vuln@krcert.or.kr","published":"2022-08-17T21:15:08.907","lastModified":"2024-11-21T06:49:14.327","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"This vulnerability occured by sending a malicious POST request to a specific page while logged in random user from some family of IPTIME NAS. Remote attackers can steal root privileges by changing the password of the root through a POST request."},{"lang":"es","value":"Esta vulnerabilidad es producida al enviar una petición POST maliciosa a una página específica mientras ha sido iniciada una sesión con un usuario aleatorio de alguna familia de IPTIME NAS. Los atacantes remotos pueden robar privilegios de root al cambiar la contraseña del mismo mediante una petición POST."}],"metrics":{"cvssMetricV31":[{"source":"vuln@krcert.or.kr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"vuln@krcert.or.kr","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas1dual_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.86","matchCriteriaId":"90965263-2D84-4742-B60E-0A6738D9F329"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas1dual:-:*:*:*:*:*:*:*","matchCriteriaId":"2ACEC464-70B3-452B-A1A3-594C697E3AB3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas2dual_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.86","matchCriteriaId":"C67D4CA9-5991-4E37-B3E4-F39A49E949E8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas2dual:-:*:*:*:*:*:*:*","matchCriteriaId":"271D21D5-A55E-4D4F-8473-5A7A67573DEA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:nas4dual_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.86","matchCriteriaId":"D302186C-3FF6-49F2-9622-ED3FB06F9EE1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:iptime:nas4dual:-:*:*:*:*:*:*:*","matchCriteriaId":"0429CC1A-B95C-4FB0-90D6-D6CAD8E1CC14"}]}]}],"references":[{"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66877","source":"vuln@krcert.or.kr","tags":["Third Party Advisory"]},{"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66877","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}