{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T13:07:19.463","vulnerabilities":[{"cve":{"id":"CVE-2023-52163","sourceIdentifier":"cve@mitre.org","published":"2025-02-03T21:15:12.060","lastModified":"2025-12-24T11:36:59.630","vulnStatus":"Analyzed","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"es","value":"Los dispositivos Digiever DS-2105 Pro 3.1.0.71-11 permiten la inyección del comando time_tzsetup.cgi. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con fabricante."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"cisaExploitAdd":"2025-12-22","cisaActionDue":"2026-01-12","cisaRequiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Digiever DS-2105 Pro Missing Authorization Vulnerability","weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digiever:ds-2105_pro_firmware:3.1.0.71-11:*:*:*:*:*:*:*","matchCriteriaId":"0E34BBAA-9BA1-426D-B25A-F718B9F65D4C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:digiever:ds-2105_pro:-:*:*:*:*:*:*:*","matchCriteriaId":"0C110DB3-9915-4DB4-933D-2EA222841CA1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digiever:ds-2105_pro\\+_firmware:3.1.0.71-11:*:*:*:*:*:*:*","matchCriteriaId":"BD8A7902-3D5A-4446-9243-0119C3BB32D5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:digiever:ds-2105_pro\\+:-:*:*:*:*:*:*:*","matchCriteriaId":"2352C8C4-144E-4B9D-B9DF-A7B7B2B7FFEB"}]}]}],"references":[{"url":"https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.txone.com/blog/digiever-fixes-sorely-needed/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-52163","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]},{"url":"https://www.fortinet.com/blog/threat-research/shadowv2-casts-a-shadow-over-iot-devices","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}