{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:48:34.265","vulnerabilities":[{"cve":{"id":"CVE-2024-47133","sourceIdentifier":"vultures@jpcert.or.jp","published":"2024-12-05T10:31:40.430","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"UD-LT1 firmware Ver.2.1.9 and earlier and UD-LT1/EX firmware Ver.2.1.9 and earlier allow a remote authenticated attacker with an administrative account to execute arbitrary OS commands."},{"lang":"es","value":"El firmware UD-LT1 versión 2.1.8 y anteriores y el firmware UD-LT1/EX versión 2.1.8 y anteriores permiten que un atacante remoto autenticado con una cuenta administrativa ejecute comandos arbitrarios del sistema operativo."}],"metrics":{"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN46615026/","source":"vultures@jpcert.or.jp"},{"url":"https://www.iodata.jp/support/information/2024/11_ud-lt1/","source":"vultures@jpcert.or.jp"}]}}]}