7.8
HIGH
CVE-2021-30254
Snapdragon Buffer Overflow Vulnerability
Description

Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

INFO

Published Date :

Nov. 12, 2021, 7:15 a.m.

Last Modified :

Nov. 21, 2024, 6:03 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2021-30254 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm aqt1000_firmware
2 Qualcomm qca6390_firmware
3 Qualcomm qca6391_firmware
4 Qualcomm qca6420_firmware
5 Qualcomm qca6430_firmware
6 Qualcomm qca6574au_firmware
7 Qualcomm qca6595au_firmware
8 Qualcomm sd855_firmware
9 Qualcomm sd865_5g_firmware
10 Qualcomm sd870_firmware
11 Qualcomm sd888_5g_firmware
12 Qualcomm sdx55m_firmware
13 Qualcomm wcd9341_firmware
14 Qualcomm wcd9380_firmware
15 Qualcomm wcd9385_firmware
16 Qualcomm wcn3980_firmware
17 Qualcomm wcn3988_firmware
18 Qualcomm wcn3998_firmware
19 Qualcomm wcn6850_firmware
20 Qualcomm wcn6851_firmware
21 Qualcomm wcn6855_firmware
22 Qualcomm wcn6856_firmware
23 Qualcomm wsa8810_firmware
24 Qualcomm wsa8815_firmware
25 Qualcomm wsa8830_firmware
26 Qualcomm wsa8835_firmware
27 Qualcomm ar8035_firmware
28 Qualcomm wcn3991_firmware
29 Qualcomm wcn6750_firmware
30 Qualcomm qca6310_firmware
31 Qualcomm qca6564au_firmware
32 Qualcomm qca6574_firmware
33 Qualcomm qca6574a_firmware
34 Qualcomm qca6584au_firmware
35 Qualcomm qca8081_firmware
36 Qualcomm qca8337_firmware
37 Qualcomm qcm2290_firmware
38 Qualcomm qcm4290_firmware
39 Qualcomm qcm6490_firmware
40 Qualcomm qcs2290_firmware
41 Qualcomm qcs4290_firmware
42 Qualcomm qcs6490_firmware
43 Qualcomm sm8450_firmware
44 Qualcomm sd460_firmware
45 Qualcomm sd660_firmware
46 Qualcomm sd662_firmware
47 Qualcomm sd730_firmware
48 Qualcomm sdx55_firmware
49 Qualcomm sm4125_firmware
50 Qualcomm sm6250_firmware
51 Qualcomm sm6250p_firmware
52 Qualcomm sm6225_firmware
53 Qualcomm sm6375_firmware
54 Qualcomm wcd9326_firmware
55 Qualcomm wcd9335_firmware
56 Qualcomm wcd9340_firmware
57 Qualcomm wcd9370_firmware
58 Qualcomm wcd9375_firmware
59 Qualcomm wcn3910_firmware
60 Qualcomm wcn3950_firmware
61 Qualcomm wcn3990_firmware
62 Qualcomm wcn6740_firmware
63 Qualcomm msm8996au_firmware
64 Qualcomm wcn3660b_firmware
65 Qualcomm wcn3680b_firmware
66 Qualcomm sd480_firmware
67 Qualcomm sda429w_firmware
68 Qualcomm wcn3610_firmware
69 Qualcomm qcx315_firmware
70 Qualcomm sd690_5g_firmware
71 Qualcomm sd765_firmware
72 Qualcomm sd765g_firmware
73 Qualcomm sd768g_firmware
74 Qualcomm sd778g_firmware
75 Qualcomm sd780g_firmware
76 Qualcomm sdx65_firmware
77 Qualcomm apq8096au_firmware
78 Qualcomm mdm9150_firmware
79 Qualcomm mdm9628_firmware
80 Qualcomm qca6564a_firmware
81 Qualcomm qcs410_firmware
82 Qualcomm qcs610_firmware
83 Qualcomm qca6174a_firmware
84 Qualcomm qca9377_firmware
85 Qualcomm qcs603_firmware
86 Qualcomm qcs605_firmware
87 Qualcomm sd_675_firmware
88 Qualcomm sd670_firmware
89 Qualcomm sd675_firmware
90 Qualcomm sd678_firmware
91 Qualcomm sd845_firmware
92 Qualcomm sdx50m_firmware
93 Qualcomm apq8009_firmware
94 Qualcomm apq8009w_firmware
95 Qualcomm mdm9250_firmware
96 Qualcomm mdm9650_firmware
97 Qualcomm msm8108_firmware
98 Qualcomm msm8208_firmware
99 Qualcomm qcm6125_firmware
100 Qualcomm msm8209_firmware
101 Qualcomm msm8608_firmware
102 Qualcomm msm8909w_firmware
103 Qualcomm qcs6125_firmware
104 Qualcomm qca9379_firmware
105 Qualcomm qualcomm215_firmware
106 Qualcomm sd210_firmware
107 Qualcomm sd429_firmware
108 Qualcomm sd835_firmware
109 Qualcomm sdm429w_firmware
110 Qualcomm sdw2500_firmware
111 Qualcomm wcn3615_firmware
112 Qualcomm wcn3620_firmware
113 Qualcomm wcn3680_firmware
114 Qualcomm sd665_firmware
115 Qualcomm sd710_firmware
116 Qualcomm sd712_firmware
117 Qualcomm sd720g_firmware
118 Qualcomm msm8976_firmware
119 Qualcomm msm8976sg_firmware
120 Qualcomm qca6320_firmware
121 Qualcomm wcd9371_firmware
122 Qualcomm sd205_firmware
123 Qualcomm sdxr1_firmware
124 Qualcomm sd439_firmware
125 Qualcomm apq8017_firmware
126 Qualcomm mdm9206_firmware
127 Qualcomm mdm9607_firmware
128 Qualcomm qca9367_firmware
129 Qualcomm wcd9330_firmware
130 Qualcomm mdm9205_firmware
131 Qualcomm qca4004_firmware
132 Qualcomm mdm9330_firmware
133 Qualcomm mdm9640_firmware
134 Qualcomm wcd9306_firmware
135 Qualcomm qca6174_firmware
136 Qualcomm sd820_firmware
137 Qualcomm sm7250_firmware
138 Qualcomm sd821_firmware
139 Qualcomm qet4101_firmware
140 Qualcomm qsw8573_firmware
141 Qualcomm mdm8207_firmware
142 Qualcomm mdm9207_firmware
143 Qualcomm qca6584_firmware
144 Qualcomm sdx12_firmware
145 Qualcomm sd_636_firmware
146 Qualcomm sdm630_firmware
147 Qualcomm qca6694_firmware
148 Qualcomm apq8053_firmware
149 Qualcomm msm8953_firmware
150 Qualcomm apq8037_firmware
151 Qualcomm msm8917_firmware
152 Qualcomm msm8920_firmware
153 Qualcomm msm8937_firmware
154 Qualcomm msm8940_firmware
155 Qualcomm sd450_firmware
156 Qualcomm sd632_firmware
157 Qualcomm wcn3660_firmware
158 Qualcomm sm7325_firmware
159 Qualcomm mdm9230_firmware
160 Qualcomm mdm9630_firmware
161 Qualcomm csr6030_firmware
162 Qualcomm qca6694au_firmware
163 Qualcomm sm8450p_firmware
164 Qualcomm apq8009
165 Qualcomm apq8009w
166 Qualcomm apq8017
167 Qualcomm apq8037
168 Qualcomm apq8053
169 Qualcomm apq8096au
170 Qualcomm aqt1000
171 Qualcomm ar8035
172 Qualcomm mdm9206
173 Qualcomm mdm9230
174 Qualcomm mdm9330
175 Qualcomm mdm9607
176 Qualcomm mdm9628
177 Qualcomm mdm9630
178 Qualcomm mdm9640
179 Qualcomm mdm9650
180 Qualcomm msm8108
181 Qualcomm msm8208
182 Qualcomm msm8209
183 Qualcomm msm8608
184 Qualcomm msm8909w
185 Qualcomm msm8917
186 Qualcomm msm8920
187 Qualcomm msm8937
188 Qualcomm msm8940
189 Qualcomm msm8953
190 Qualcomm msm8976
191 Qualcomm msm8976sg
192 Qualcomm msm8996au
193 Qualcomm qca6174
194 Qualcomm qca6174a
195 Qualcomm qca6310
196 Qualcomm qca6320
197 Qualcomm qca6390
198 Qualcomm qca6391
199 Qualcomm qca6420
200 Qualcomm qca6430
201 Qualcomm qca6564a
202 Qualcomm qca6564au
203 Qualcomm qca6574
204 Qualcomm qca6574a
205 Qualcomm qca6574au
206 Qualcomm qca6584
207 Qualcomm qca6584au
208 Qualcomm qca6595au
209 Qualcomm qca6694
210 Qualcomm qca6694au
211 Qualcomm qca9379
212 Qualcomm qcm2290
213 Qualcomm qcm4290
214 Qualcomm qcm6125
215 Qualcomm qcs2290
216 Qualcomm qcs410
217 Qualcomm qcs4290
218 Qualcomm qcs603
219 Qualcomm qcs605
220 Qualcomm qcs610
221 Qualcomm qcs6125
222 Qualcomm qet4101
223 Qualcomm qsw8573
224 Qualcomm qualcomm215
225 Qualcomm sd_636
226 Qualcomm sd_675
227 Qualcomm sd205
228 Qualcomm sd210
229 Qualcomm sd429
230 Qualcomm sd439
231 Qualcomm sd450
232 Qualcomm sd460
233 Qualcomm sd632
234 Qualcomm sd660
235 Qualcomm sd662
236 Qualcomm sd665
237 Qualcomm sd670
238 Qualcomm sd675
239 Qualcomm sd690_5g
240 Qualcomm sd710
241 Qualcomm sd712
242 Qualcomm sd720g
243 Qualcomm sd730
244 Qualcomm sd765
245 Qualcomm sd765g
246 Qualcomm sd768g
247 Qualcomm sd820
248 Qualcomm sd821
249 Qualcomm sd835
250 Qualcomm sd845
251 Qualcomm sd855
252 Qualcomm sd865_5g
253 Qualcomm sd888_5g
254 Qualcomm sda429w
255 Qualcomm sdm429w
256 Qualcomm sdm630
257 Qualcomm sdx50m
258 Qualcomm sdx55
259 Qualcomm sdx55m
260 Qualcomm sdxr1
261 Qualcomm sm4125
262 Qualcomm sm6250
263 Qualcomm sm6250p
264 Qualcomm wcd9306
265 Qualcomm wcd9326
266 Qualcomm wcd9330
267 Qualcomm wcd9335
268 Qualcomm wcd9340
269 Qualcomm wcd9341
270 Qualcomm wcd9370
271 Qualcomm wcd9371
272 Qualcomm wcd9375
273 Qualcomm wcd9380
274 Qualcomm wcd9385
275 Qualcomm wcn3610
276 Qualcomm wcn3615
277 Qualcomm wcn3620
278 Qualcomm wcn3660
279 Qualcomm wcn3660b
280 Qualcomm wcn3680
281 Qualcomm wcn3680b
282 Qualcomm wcn3910
283 Qualcomm wcn3950
284 Qualcomm wcn3980
285 Qualcomm wcn3988
286 Qualcomm wcn3990
287 Qualcomm wcn3991
288 Qualcomm wcn3998
289 Qualcomm wcn6740
290 Qualcomm wcn6750
291 Qualcomm wcn6850
292 Qualcomm wcn6851
293 Qualcomm wcn6856
294 Qualcomm wsa8810
295 Qualcomm wsa8815
296 Qualcomm wsa8830
297 Qualcomm wsa8835
298 Qualcomm qca8337
299 Qualcomm csr6030
300 Qualcomm mdm8207
301 Qualcomm mdm9150
302 Qualcomm mdm9205
303 Qualcomm mdm9207
304 Qualcomm mdm9250
305 Qualcomm qca4004
306 Qualcomm qca9367
307 Qualcomm qca9377
308 Qualcomm sdw2500
309 Qualcomm qca8081
310 Qualcomm wcn6855
311 Qualcomm sd480
312 Qualcomm qcs6490
313 Qualcomm qcm6490
314 Qualcomm sm6225
315 Qualcomm sm6375
316 Qualcomm sm7325
317 Qualcomm sm8450
318 Qualcomm sd870
319 Qualcomm sd678
320 Qualcomm sd778g
321 Qualcomm sd780g
322 Qualcomm sdx65
323 Qualcomm qcx315
324 Qualcomm sdx12
325 Qualcomm sm7250
326 Qualcomm sm8450p
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-30254.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-30254 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-30254 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Nov. 16, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin Vendor Advisory
    Added CWE NIST CWE-20
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8009w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8009w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csr6030_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csr6030:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9207_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9207:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9230_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9230:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9630:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8208_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8976_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8976sg_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8976sg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6694_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6694:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6694au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6694au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qet4101_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qsw8573_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd712_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd712:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdw2500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdw2500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8450p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8450p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-30254 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-30254 weaknesses.

CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters Using Leading 'Ghost' Character Sequences to Bypass Input Filters CAPEC-7: Blind SQL Injection Blind SQL Injection CAPEC-8: Buffer Overflow in an API Call Buffer Overflow in an API Call CAPEC-9: Buffer Overflow in Local Command-Line Utilities Buffer Overflow in Local Command-Line Utilities CAPEC-10: Buffer Overflow via Environment Variables Buffer Overflow via Environment Variables CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-14: Client-side Injection-induced Buffer Overflow Client-side Injection-induced Buffer Overflow CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-23: File Content Injection File Content Injection CAPEC-24: Filter Failure through Buffer Overflow Filter Failure through Buffer Overflow CAPEC-28: Fuzzing Fuzzing CAPEC-31: Accessing/Intercepting/Modifying HTTP Cookies Accessing/Intercepting/Modifying HTTP Cookies CAPEC-42: MIME Conversion MIME Conversion CAPEC-43: Exploiting Multiple Input Interpretation Layers Exploiting Multiple Input Interpretation Layers CAPEC-45: Buffer Overflow via Symbolic Links Buffer Overflow via Symbolic Links CAPEC-46: Overflow Variables and Tags Overflow Variables and Tags CAPEC-47: Buffer Overflow via Parameter Expansion Buffer Overflow via Parameter Expansion CAPEC-52: Embedding NULL Bytes Embedding NULL Bytes CAPEC-53: Postfix, Null Terminate, and Backslash Postfix, Null Terminate, and Backslash CAPEC-63: Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) CAPEC-64: Using Slashes and URL Encoding Combined to Bypass Validation Logic Using Slashes and URL Encoding Combined to Bypass Validation Logic CAPEC-67: String Format Overflow in syslog() String Format Overflow in syslog() CAPEC-71: Using Unicode Encoding to Bypass Validation Logic Using Unicode Encoding to Bypass Validation Logic CAPEC-72: URL Encoding URL Encoding CAPEC-73: User-Controlled Filename User-Controlled Filename CAPEC-78: Using Escaped Slashes in Alternate Encoding Using Escaped Slashes in Alternate Encoding CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic Using UTF-8 Encoding to Bypass Validation Logic CAPEC-81: Web Server Logs Tampering Web Server Logs Tampering CAPEC-83: XPath Injection XPath Injection CAPEC-85: AJAX Footprinting AJAX Footprinting CAPEC-88: OS Command Injection OS Command Injection CAPEC-101: Server Side Include (SSI) Injection Server Side Include (SSI) Injection CAPEC-104: Cross Zone Scripting Cross Zone Scripting CAPEC-108: Command Line Execution through SQL Injection Command Line Execution through SQL Injection CAPEC-109: Object Relational Mapping Injection Object Relational Mapping Injection CAPEC-110: SQL Injection through SOAP Parameter Tampering SQL Injection through SOAP Parameter Tampering CAPEC-120: Double Encoding Double Encoding CAPEC-135: Format String Injection Format String Injection CAPEC-136: LDAP Injection LDAP Injection CAPEC-153: Input Data Manipulation Input Data Manipulation CAPEC-182: Flash Injection Flash Injection CAPEC-209: XSS Using MIME Type Mismatch XSS Using MIME Type Mismatch CAPEC-230: Serialized Data with Nested Payloads Serialized Data with Nested Payloads CAPEC-231: Oversized Serialized Data Payloads Oversized Serialized Data Payloads CAPEC-250: XML Injection XML Injection CAPEC-261: Fuzzing for garnering other adjacent user/sensitive data Fuzzing for garnering other adjacent user/sensitive data CAPEC-267: Leverage Alternate Encoding Leverage Alternate Encoding CAPEC-473: Signature Spoof Signature Spoof CAPEC-588: DOM-Based XSS DOM-Based XSS CAPEC-664: Server Side Request Forgery Server Side Request Forgery
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.10280

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability