{"api_version":"1","generated_at":"2026-04-23T06:44:24+00:00","cve":"CVE-2018-16195","urls":{"html":"https://cve.report/CVE-2018-16195","api":"https://cve.report/api/cve/CVE-2018-16195.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-16195","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-16195"},"summary":{"title":"CVE-2018-16195","description":"Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands via SOAP interface of UPnP.","state":"PUBLIC","assigner":"vultures@jpcert.or.jp","published_at":"2019-01-09 23:29:00","updated_at":"2019-01-17 19:43:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://jpn.nec.com/security-info/secinfo/nv18-021.html","name":"https://jpn.nec.com/security-info/secinfo/nv18-021.html","refsource":"MISC","tags":["Vendor Advisory"],"title":"NV18-021: NEC製品セキュリティ情報 | NEC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://jvn.jp/en/jp/JVN87535892/index.html","name":"JVN#87535892","refsource":"JVN","tags":["Third Party Advisory"],"title":"JVN#87535892: Multiple vulnerabilities in Aterm WF1200CR and Aterm WG1200CR","mime":"text/xml","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-16195","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16195","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"16195","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wf1200cr","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16195","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wf1200cr","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16195","vulnerable":"1","versionEndIncluding":"1.1.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"nec","cpe5":"aterm_wf1200cr_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16195","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wg1200cr","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16195","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wg1200cr","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16195","vulnerable":"1","versionEndIncluding":"1.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"nec","cpe5":"aterm_wg1200cr_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2018-16195","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Aterm WF1200CR and Aterm WG1200CR","version":{"version_data":[{"version_value":"(Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier)"}]}}]},"vendor_name":"NEC Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands via SOAP interface of UPnP."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"OS Command Injection"}]}]},"references":{"reference_data":[{"name":"JVN#87535892","refsource":"JVN","url":"https://jvn.jp/en/jp/JVN87535892/index.html"},{"name":"https://jpn.nec.com/security-info/secinfo/nv18-021.html","refsource":"MISC","url":"https://jpn.nec.com/security-info/secinfo/nv18-021.html"}]}},"nvd":{"publishedDate":"2019-01-09 23:29:00","lastModifiedDate":"2019-01-17 19:43:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":8.3},"severity":"HIGH","exploitabilityScore":6.5,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"16195","Ordinal":"132985","Title":"CVE-2018-16195","CVE":"CVE-2018-16195","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"16195","Ordinal":"1","NoteData":"Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands via SOAP interface of UPnP.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"16195","Ordinal":"2","NoteData":"2019-01-09","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"16195","Ordinal":"3","NoteData":"2019-01-09","Type":"Other","Title":"Modified"}]}}}