Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DD9417D-0515-4B21-AD32-E6B137575D01", "vulnerable": false}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:huawei:rse6500_firmware:v100r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "AD1A7B89-F3A6-4FB1-8871-15BBFFC82E54", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:huawei:vp9600_series_firmware:v200r001c01:*:*:*:*:*:*:*", "matchCriteriaId": "9AB2DCFE-9E91-4AAE-AE2A-06EC026FB7B3", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:vp9600_series_firmware:v200r001c02:*:*:*:*:*:*:*", "matchCriteriaId": "DB03BA5E-2C3F-4B2E-A022-74F5ECC19BA2", "vulnerable": true}, {"criteria": "cpe:2.3:o:huawei:vp9600_series_firmware:v200r001c30:*:*:*:*:*:*:*", "matchCriteriaId": "0CF68D4C-1DEB-414A-8A26-FC23681EB1FD", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:huawei:vp9630:-:*:*:*:*:*:*:*", "matchCriteriaId": "47FDD1F2-BAA8-4133-A05D-C84063C1F270", "vulnerable": false}, {"criteria": "cpe:2.3:h:huawei:vp9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "23DBFBB5-2716-4816-ABA8-78B6C2D76668", "vulnerable": false}, {"criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Buffer overflow in Huawei VP9660, VP9650, and VP9630 multipoint control unit devices with software before V500R002C00SPC200 and RSE6500 videoconference devices with software before V500R002C00SPC100, when an unspecified service is enabled, allows remote attackers to execute arbitrary code via a crafted packet, aka HWPSIRT-2016-05054."}, {"lang": "es", "value": "Desbordamiento del buffer en dispositivos Huawei VP9660, VP9650 y VP9630 multipoint control unit en versiones anteriores a V500R002C00SPC200 y dispositivos de videoconferenia RSE6500 en versiones anteriores a V500R002C00SPC100, cuando un servicio no especificado est\u00e1 activado, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado, tambi\u00e9n conocido como HWPSIRT-2016-05054."}], "id": "CVE-2016-5234", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-06-13T14:59:09.290", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160601-01-videoconference-en"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/90978"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160601-01-videoconference-en"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90978"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}