{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T05:33:22.792","vulnerabilities":[{"cve":{"id":"CVE-2023-41351","sourceIdentifier":"twcert@cert.org.tw","published":"2023-11-03T06:15:07.107","lastModified":"2024-11-21T08:21:07.877","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service."},{"lang":"es","value":"Chunghwa Telecom NOKIA G-040W-Q tiene una vulnerabilidad de omisión de autenticación, que permite a un atacante remoto no autenticado omitir el mecanismo de autenticación para iniciar sesión en el dispositivo mediante una URL alternativa. Esto hace posible que atacantes remotos no autenticados inicien sesión como cualquier usuario existente, como un administrador, para realizar operaciones arbitrarias en el sistema o interrumpir el servicio."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-288"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:nokia:g-040w-q_firmware:g040wqr201207:*:*:*:*:*:*:*","matchCriteriaId":"B44938DD-B7A2-4D58-8B61-AE64C62A3E83"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:nokia:g-040w-q:-:*:*:*:*:*:*:*","matchCriteriaId":"B61B9373-5B22-4C83-9781-FCFEB29BB3DB"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-7501-6155a-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-7501-6155a-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}