{"api_version":"1","generated_at":"2026-04-23T06:43:14+00:00","cve":"CVE-2020-5524","urls":{"html":"https://cve.report/CVE-2020-5524","api":"https://cve.report/api/cve/CVE-2020-5524.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5524","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5524"},"summary":{"title":"CVE-2020-5524","description":"Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function.","state":"PUBLIC","assigner":"vultures@jpcert.or.jp","published_at":"2020-02-21 10:15:00","updated_at":"2020-02-21 18:41:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://jvn.jp/en/jp/JVN49410695/index.html","name":"https://jvn.jp/en/jp/JVN49410695/index.html","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"JVN#49410695: Multiple vulnerabilities in Aterm WG2600HS","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://jvn.jp/en/jp/JVN25766797/","name":"https://jvn.jp/en/jp/JVN25766797/","refsource":"MISC","tags":["Third Party Advisory"],"title":"JVN#25766797: Multiple OS command injection vulnerabilities in Aterm WF1200C, Aterm WG1200CR, and Aterm WG2600HS","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://jpn.nec.com/security-info/secinfo/nv20-003.html","name":"https://jpn.nec.com/security-info/secinfo/nv20-003.html","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"NV20-003: セキュリティ情報 | NEC","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5524","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5524","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5524","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wf1200c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wf1200c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"1","versionEndIncluding":"1.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"nec","cpe5":"aterm_wf1200c_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wg1200cr","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wg1200cr","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"1","versionEndIncluding":"1.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"nec","cpe5":"aterm_wg1200cr_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wg2600hs","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"nec","cpe5":"aterm_wg2600hs","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5524","vulnerable":"1","versionEndIncluding":"1.3.2","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"nec","cpe5":"aterm_wg2600hs_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","references":{"reference_data":[{"url":"https://jvn.jp/en/jp/JVN49410695/index.html","refsource":"MISC","name":"https://jvn.jp/en/jp/JVN49410695/index.html"},{"url":"https://jpn.nec.com/security-info/secinfo/nv20-003.html","refsource":"MISC","name":"https://jpn.nec.com/security-info/secinfo/nv20-003.html"}]},"description":{"description_data":[{"lang":"eng","value":"Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function."}]},"data_type":"CVE","affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"version":{"version_data":[{"version_value":"Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier"}]},"product_name":"Aterm series"}]},"vendor_name":"NEC Corporation"}]}},"CVE_data_meta":{"ID":"CVE-2020-5524","ASSIGNER":"vultures@jpcert.or.jp","STATE":"PUBLIC"},"data_format":"MITRE","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"OS Command Injection"}]}]}},"nvd":{"publishedDate":"2020-02-21 10:15:00","lastModifiedDate":"2020-02-21 18:41:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":8.3},"severity":"HIGH","exploitabilityScore":6.5,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:nec:aterm_wf1200c_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:nec:aterm_wf1200c:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5524","Ordinal":"165770","Title":"CVE-2020-5524","CVE":"CVE-2020-5524","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5524","Ordinal":"1","NoteData":"Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5524","Ordinal":"2","NoteData":"2020-02-21","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5524","Ordinal":"3","NoteData":"2020-02-21","Type":"Other","Title":"Modified"}]}}}