cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-11587,https://securityvulnerability.io/vulnerability/CVE-2017-11587,,"On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is directory traversal in the filename parameter to the /download.conf URI.",Cisco,Residential Gateway Firmware,7.5,HIGH,0.00171999994199723,false,,false,false,false,,,false,false,,2017-07-24T00:00:00.000Z,0 CVE-2017-11589,https://securityvulnerability.io/vulnerability/CVE-2017-11589,,"On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is no access control for info.html, wancfg.cmd, rtroutecfg.cmd, arpview.cmd, cpuview.cmd, memoryview.cmd, statswan.cmd, statsatm.cmd, scsrvcntr.cmd, scacccntr.cmd, logview.cmd, voicesipview.cmd, usbview.cmd, wlmacflt.cmd, wlwds.cmd, wlstationlist.cmd, HPNAShow.cmd, HPNAView.cmd, qoscls.cmd, qosqueue.cmd, portmap.cmd, scmacflt.cmd, scinflt.cmd, scoutflt.cmd, certlocal.cmd, or certca.cmd.",Cisco,Residential Gateway Firmware,9.8,CRITICAL,0.001930000027641654,false,,false,false,false,,,false,false,,2017-07-24T00:00:00.000Z,0 CVE-2017-11588,https://securityvulnerability.io/vulnerability/CVE-2017-11588,,"On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command execution via shell metacharacters in the pingAddr parameter to the waitPingqry.cgi URI. The command output is visible at /PingMsg.cmd.",Cisco,Residential Gateway Firmware,9.8,CRITICAL,0.0065299998968839645,false,,false,false,false,,,false,false,,2017-07-24T00:00:00.000Z,0 CVE-2016-1325,https://securityvulnerability.io/vulnerability/CVE-2016-1325,,"The administration interface on Cisco DPC3939B and DPC3941 devices allows remote attackers to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.",Cisco,Dpc3939 Wireless Residential Voice Gateway Firmware,7.5,HIGH,0.0013599999947473407,false,,false,false,false,,,false,false,,2016-03-09T20:00:00.000Z,0 CVE-2015-6361,https://securityvulnerability.io/vulnerability/CVE-2015-6361,,"The administrative web interface on Cisco DPC3939 (XB3) devices with firmware 121109aCMCST allows remote authenticated users to execute arbitrary commands via unspecified fields, aka Bug ID CSCuw86170.",Cisco,Dpc3939 Wireless Residential Voice Gateway Firmware,,,0.0044200001284480095,false,,false,false,false,,,false,false,,2015-12-13T02:00:00.000Z,0