{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7287","assignerOrgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","state":"PUBLISHED","assignerShortName":"Zyxel","dateReserved":"2026-04-28T09:40:36.000Z","datePublished":"2026-05-12T03:56:13.433Z","dateUpdated":"2026-05-12T12:47:28.490Z"},"containers":{"cna":{"providerMetadata":{"orgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","shortName":"Zyxel","dateUpdated":"2026-05-12T03:56:13.433Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-120","description":"CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","type":"CWE"}]}],"affected":[{"vendor":"Zyxel","product":"NWA1100-N firmware","versions":[{"status":"affected","version":"1.00(AACE.1)C0"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C0 could allow an attacker to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request to a vulnerable device.","supportingMedia":[{"type":"text/html","base64":false,"value":"** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C0 could allow an attacker to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request to a vulnerable device."}]}],"tags":["unsupported-when-assigned"],"references":[{"url":"https://www.zyxel.com/global/en/support/end-of-life"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.2"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-12T12:47:16.360437Z","id":"CVE-2026-7287","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-12T12:47:28.490Z"}}]}}