{"api_version":"1","generated_at":"2026-05-13T12:36:26+00:00","cve":"CVE-2016-1227","urls":{"html":"https://cve.report/CVE-2016-1227","api":"https://cve.report/api/cve/CVE-2016-1227.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-1227","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-1227"},"summary":{"title":"CVE-2016-1227","description":"NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.","state":"PUBLISHED","assigner":"jpcert","published_at":"2016-07-03 14:59:01","updated_at":"2026-05-06 22:30:45"},"problem_types":["NVD-CWE-noinfo","n/a"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.5","severity":"","vector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000105","name":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000105","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry","Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://jvn.jp/en/jp/JVN77403442/index.html","name":"http://jvn.jp/en/jp/JVN77403442/index.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"JVN#77403442: Multiple Hikari Denwa routers vulnerable to OS command injection","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://web116.jp/ced/support/news/contents/2016/20160627.html","name":"http://web116.jp/ced/support/news/contents/2016/20160627.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html","name":"http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-1227","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1227","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"1227","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ntt-east","cpe5":"pr-400mi","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"1","versionEndIncluding":"07.00.1006","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ntt-east","cpe5":"pr-400mi_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ntt-east","cpe5":"rt-400mi","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"1","versionEndIncluding":"07.00.1006","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ntt-east","cpe5":"rt-400mi_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ntt-east","cpe5":"rv-440mi","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"1","versionEndIncluding":"07.00.1006","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ntt-east","cpe5":"rv-440mi_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ntt-west","cpe5":"pr-400mi","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"1","versionEndIncluding":"07.00.1005","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ntt-west","cpe5":"pr-400mi_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ntt-west","cpe5":"rt-400mi","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"1","versionEndIncluding":"07.00.1005","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ntt-west","cpe5":"rt-400mi_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ntt-west","cpe5":"rv-440mi","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"1227","vulnerable":"1","versionEndIncluding":"07.00.1005","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ntt-west","cpe5":"rv-440mi_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-05T22:48:13.637Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html"},{"name":"JVNDB-2016-000105","tags":["third-party-advisory","x_refsource_JVNDB","x_transferred"],"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000105"},{"name":"JVN#77403442","tags":["third-party-advisory","x_refsource_JVN","x_transferred"],"url":"http://jvn.jp/en/jp/JVN77403442/index.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://web116.jp/ced/support/news/contents/2016/20160627.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2016-06-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-07-03T14:57:01.000Z","orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html"},{"name":"JVNDB-2016-000105","tags":["third-party-advisory","x_refsource_JVNDB"],"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000105"},{"name":"JVN#77403442","tags":["third-party-advisory","x_refsource_JVN"],"url":"http://jvn.jp/en/jp/JVN77403442/index.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://web116.jp/ced/support/news/contents/2016/20160627.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2016-1227","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html","refsource":"CONFIRM","url":"http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html"},{"name":"JVNDB-2016-000105","refsource":"JVNDB","url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000105"},{"name":"JVN#77403442","refsource":"JVN","url":"http://jvn.jp/en/jp/JVN77403442/index.html"},{"name":"http://web116.jp/ced/support/news/contents/2016/20160627.html","refsource":"CONFIRM","url":"http://web116.jp/ced/support/news/contents/2016/20160627.html"}]}}}},"cveMetadata":{"assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","cveId":"CVE-2016-1227","datePublished":"2016-07-03T14:00:00.000Z","dateReserved":"2015-12-26T00:00:00.000Z","dateUpdated":"2024-08-05T22:48:13.637Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2016-07-03 14:59:01","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["NVD-CWE-noinfo","n/a"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"07.00.1006","matchCriteriaId":"B964A954-08EB-416E-BDAE-D66F0C1B5366"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*","matchCriteriaId":"64CEFE29-5AF9-4935-B084-6B556921AAF0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"07.00.1005","matchCriteriaId":"A792CE36-D838-4D25-ADAB-898BE7F3439B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*","matchCriteriaId":"A55EB69F-E103-4A45-8083-A2D6A3AD36C8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*","matchCriteriaId":"D76D559B-2936-41B9-A810-1658CE125A5A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"07.00.1005","matchCriteriaId":"858278B2-7203-427C-988C-3104970A7E00"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"07.00.1005","matchCriteriaId":"DEC56ACD-3B81-4434-AA4D-DAEAF8442434"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*","matchCriteriaId":"C2561A87-C99A-4E27-A0AE-E22EE2513735"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ntt-east:pr-400mi_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"07.00.1006","matchCriteriaId":"3E7F48A6-5846-4605-8655-3DBD453839B9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*","matchCriteriaId":"7AF589E8-4E1A-43B2-9F44-513D393C2945"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"07.00.1006","matchCriteriaId":"57B97F48-D979-4BD1-B327-5852BA71E360"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*","matchCriteriaId":"154E8DF0-AAB4-4926-AD4E-2EB043736810"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"1227","Ordinal":"1","Title":"CVE-2016-1227","CVE":"CVE-2016-1227","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"1227","Ordinal":"1","NoteData":"NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.","Type":"Description","Title":"CVE-2016-1227"},{"CveYear":"2016","CveId":"1227","Ordinal":"2","NoteData":"2016-07-03","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"1227","Ordinal":"3","NoteData":"2016-07-03","Type":"Other","Title":"Modified"}]}}}