{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T09:58:00.702","vulnerabilities":[{"cve":{"id":"CVE-2025-27797","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-04-09T09:15:16.977","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"OS command injection vulnerability in the specific service exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos del sistema operativo en el servicio específico de Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un atacante remoto que pueda iniciar sesión en el producto podría ejecutar un comando arbitrario del sistema operativo."}],"metrics":{"cvssMetricV31":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU93925742/","source":"vultures@jpcert.or.jp"},{"url":"https://www.inaba.co.jp/abaniact/news/security_20250404.pdf","source":"vultures@jpcert.or.jp"}]}}]}