{"api_version":"1","generated_at":"2026-04-23T08:39:30+00:00","cve":"CVE-2008-1526","urls":{"html":"https://cve.report/CVE-2008-1526","api":"https://cve.report/api/cve/CVE-2008-1526.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-1526","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-1526"},"summary":{"title":"CVE-2008-1526","description":"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-03-26 10:44:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-916","n/a"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:N/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.gnucitizen.org/projects/router-hacking-challenge/","name":"http://www.gnucitizen.org/projects/router-hacking-challenge/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Router Hacking Challenge | GNUCITIZEN","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf","name":"http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"404 - File or directory not found.","mime":"application/pdf","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/489009/100/0/threaded","name":"http://www.securityfocus.com/archive/1/489009/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-1526","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1526","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660h-61","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-61_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-61_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660h-63","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-63_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-63_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660h-67","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-67_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-67_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660h-d1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-d1_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-d1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660h-d3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-d3_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-d3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660h-t1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-t1_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660h-t1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660hn-51","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hn-51_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hn-51_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660hw_d1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hw_d1_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hw_d1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660hw_d3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hw_d3_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hw_d3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-660hw_t3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hw_t3_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-660hw_t3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-661h","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-661hnu-f1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661hnu-f1_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661hnu-f1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-661hnu-f3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661hnu-f3_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661hnu-f3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-661hw-d1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661hw-d1_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661hw-d1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661h_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-661h_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-662h-61","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662h-61_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662h-61_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-662hw-d","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-662hw-d1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662hw-d1_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662hw-d1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-662hw-d3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662hw-d3_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662hw-d3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662hw-d_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-662hw-d_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"zyxel","cpe5":"p-663hn-51","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-663hn-51_firmware","cpe6":"3.40\\(pe9\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1526","vulnerable":"1","versionEndIncluding":"3.40\\(ahq.3\\)","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"zyxel","cpe5":"p-663hn-51_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T08:24:42.332Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20080301 The Router Hacking Challenge is Over!","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/489009/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.gnucitizen.org/projects/router-hacking-challenge/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-02-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-11T19:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20080301 The Router Hacking Challenge is Over!","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/489009/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.gnucitizen.org/projects/router-hacking-challenge/"},{"tags":["x_refsource_MISC"],"url":"http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-1526","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20080301 The Router Hacking Challenge is Over!","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/489009/100/0/threaded"},{"name":"http://www.gnucitizen.org/projects/router-hacking-challenge/","refsource":"MISC","url":"http://www.gnucitizen.org/projects/router-hacking-challenge/"},{"name":"http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf","refsource":"MISC","url":"http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-1526","datePublished":"2008-03-26T10:00:00.000Z","dateReserved":"2008-03-25T00:00:00.000Z","dateUpdated":"2024-08-07T08:24:42.332Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-03-26 10:44:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-916","n/a"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-663hn-51_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"62972D5A-85C3-4DD4-A26A-471D4E82357F"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-663hn-51_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"4E92F1B9-AF50-4E0D-B3AC-3C306A383A44"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*","matchCriteriaId":"1F2A8EAA-E91F-48D8-82F9-0719C6F6BB2F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-61_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"5252D640-B50B-4532-ABBD-912A37F596DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-61_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"F5B68B4A-D806-49C8-AE14-504BE57CAB95"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660h-61:-:*:*:*:*:*:*:*","matchCriteriaId":"B996FCFC-C719-43B1-9088-3867D5C124BE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-63_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"39CB46BC-64D2-46AE-BD36-1A79EB36B292"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-63_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"5142FA69-CA58-46F4-BCDD-9798DCCB3AD3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660h-63:-:*:*:*:*:*:*:*","matchCriteriaId":"D0F5B1A3-7A36-4A84-B0C1-508036A0AB5B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-67_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"67B02999-B7EB-402E-8146-020ACC9ED382"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-67_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"76279D36-5A32-4B6E-9F78-3EEFB70E55C1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660h-67:-:*:*:*:*:*:*:*","matchCriteriaId":"6D676131-6B32-4B57-8E77-95A9F63375B0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-d1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"DD203D62-1938-4521-81D5-154A7425B9B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"3295C0E2-C458-4902-8694-2A3ACFBCE653"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660h-d1:-:*:*:*:*:*:*:*","matchCriteriaId":"DF5193DA-10B0-4C7D-B210-CF074E531215"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-d3_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"9001B98C-9F05-4C1A-8193-D1B553484A7D"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-d3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"910FB6FC-66EC-48EE-8D61-BAE34D7BFB65"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660h-d3:-:*:*:*:*:*:*:*","matchCriteriaId":"38FD0899-E818-461E-B6FA-48E9564BBB04"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hn-51_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"C9D5E082-EFA6-4EC1-B0F7-D4F41D713F92"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hn-51_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"D1199BFD-05AF-4307-805D-8CFE09DC9FBA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*","matchCriteriaId":"B0138796-FFDC-4976-83AB-018DD7CD7D5F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-t1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"C5E642F1-A6C9-47D8-B8CA-591B925AD632"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660h-t1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"92A66C1F-D2BC-46D2-920B-AF81E4964D2C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660h-t1:-:*:*:*:*:*:*:*","matchCriteriaId":"7AFE9380-506C-4DB6-B14E-BF8D36A5B403"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hw_d1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"88F93947-8F4C-4297-BDC1-248C279A3C66"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hw_d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"15EADE70-CC53-4FFD-A7A0-6F47112DEFF8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660hw_d1:-:*:*:*:*:*:*:*","matchCriteriaId":"1D13FB1A-637D-4E69-B84F-05531DCA5769"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hw_d3_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"20A15016-C985-4DC2-8063-20B34A8F38C8"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hw_d3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"211F500D-83A0-4E98-A602-5A8E28DA80C6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660hw_d3:-:*:*:*:*:*:*:*","matchCriteriaId":"465FD6ED-C294-49B2-8F2C-8EF0633DABFF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hw_t3_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"E6200AB4-23E4-4D5D-AE01-FA77BD2802E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-660hw_t3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"7EBA6080-40A5-41B8-9ABA-DE9B4D14B905"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-660hw_t3:-:*:*:*:*:*:*:*","matchCriteriaId":"26E8D38B-1859-4DCE-A566-777432CB7E9D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661hnu-f1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"75CC92BC-C701-4CDB-B3BD-D1A35AE2B513"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661hnu-f1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"B1C64678-E7F5-4D49-B057-81A7D332FAEE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-661hnu-f1:-:*:*:*:*:*:*:*","matchCriteriaId":"3D31A24A-C61D-4C9E-ADB7-2A82348A1F8F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661h_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"571F3900-C4E5-4BA7-BCC4-6F4CB11C37FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661h_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"82811C5C-C3B3-4F59-B4C7-FF94337575A6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-661h:-:*:*:*:*:*:*:*","matchCriteriaId":"AC4294BF-24E3-48CB-9C9C-3F212DC3B44C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661hw-d1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"F45DA65D-375A-44C3-8C13-56BE11A62D96"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661hw-d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"3D302F58-44B7-4664-8C5B-CD7801BC2C8F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-661hw-d1:-:*:*:*:*:*:*:*","matchCriteriaId":"213239B3-6262-43BD-9789-895123B458CC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661hnu-f3_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"9E098395-FAA8-4F2F-9BA3-CE020128CC4B"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-661hnu-f3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"1B7AC499-C52B-4320-9DAC-32268EA2EE2F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-661hnu-f3:-:*:*:*:*:*:*:*","matchCriteriaId":"4C246CBE-3153-48F6-9DB3-111496519A54"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662hw-d3_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"E0FF5102-C646-4576-B06B-7AEDF30597AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662hw-d3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"08C40AFF-B177-41D6-AB6B-7684F76B04D6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-662hw-d3:-:*:*:*:*:*:*:*","matchCriteriaId":"293A9D18-75F3-4925-A823-783C5D3C5712"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662hw-d_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"248CEACF-760B-400F-AAF8-3942207D7D9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662hw-d_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"9D3C331D-6579-4A53-A0E1-7B191F52D78F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-662hw-d:-:*:*:*:*:*:*:*","matchCriteriaId":"AFCEFCAB-785B-441D-9CCF-B45FC769A648"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662hw-d1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"4D84E350-5816-4ABE-A2A1-ABB719DFB65A"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662hw-d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"E7823501-F6A1-4F4A-98B8-6B272AB6073B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-662hw-d1:-:*:*:*:*:*:*:*","matchCriteriaId":"AF7B15B0-7767-4338-9B27-94AB74D87E2F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662h-61_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40\\(agd.2\\)","versionEndIncluding":"3.40\\(ahq.3\\)","matchCriteriaId":"C92F00FE-2074-484E-A65E-6E6AADC6625E"},{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p-662h-61_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*","matchCriteriaId":"48C44A40-5559-483D-B532-2CEB60E0D709"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p-662h-61:-:*:*:*:*:*:*:*","matchCriteriaId":"E24CF1BB-6CE2-475F-A74E-6958FEA47374"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"1526","Ordinal":"1","Title":"CVE-2008-1526","CVE":"CVE-2008-1526","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"1526","Ordinal":"1","NoteData":"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.","Type":"Description","Title":"CVE-2008-1526"},{"CveYear":"2008","CveId":"1526","Ordinal":"2","NoteData":"2008-03-26","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"1526","Ordinal":"3","NoteData":"2018-10-11","Type":"Other","Title":"Modified"}]}}}