{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T01:07:12.951","vulnerabilities":[{"cve":{"id":"CVE-2024-29075","sourceIdentifier":"vultures@jpcert.or.jp","published":"2024-11-12T06:15:03.520","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Active debug code vulnerability exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may obtain or alter the settings of the device ."},{"lang":"es","value":"Existe una vulnerabilidad de código de depuración activa en Mesh Wi-Fi router RP562B firmware versión v1.0.2 y anteriores. Si se aprovecha esta vulnerabilidad, un atacante autenticado adyacente a la red puede obtener o alterar la configuración del dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":2.5}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-489"}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU90676195/","source":"vultures@jpcert.or.jp"}]}}]}