Based on the specified CPE (Common Platform Enumeration) schema, this endpoint will allow searches on the attributes part
, vendor
, product
, and/or version
and return a list of associated vulnerabilities.
All search fields are optional. Attributes must conform to the specifications in the NIST CPE Specification.
a
pplication, o
perating system, or h
ardware. If not specified, all parts will be searched.*
.
e.g.version=8
will only return CPEs with the exact version string 8
.version=8.0.6*
will return any CPE starting with 8.0.6
.cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
is listed in many CVEs as part of a vulnerable configuration, but only one where the the device itself is inherently vulnerable.isVulnerable=true
- Return only the CVEs where the CPE is vulnerable.curl --request GET \
--url "https://api.vulncheck.com/v3/search/cpe?vendor=mediatek&product=mt6890&version=*&isVulnerable=true" \
--header "Accept: application/json" \
--header "Authorization: Bearer insert_token_here"
{
"_benchmark": 0.064753,
"_meta": {
"timestamp": "2025-08-25T14:45:54.678582963Z",
"total_documents": 1
},
"data": [
{
"cpe": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe_struct": {
"part": "h",
"vendor": "mediatek",
"product": "mt6890",
"version": "-",
"update": "*",
"edition": "*",
"language": "*",
"sw_edition": "*",
"target_sw": "*",
"target_hw": "*",
"other": "*"
},
"cves": [
"CVE-2025-20654"
]
}
]
}
curl --request GET \
--url "https://api.vulncheck.com/v3/search/cpe?vendor=mediatek&product=mt6890&version=*" \
--header "Accept: application/json" \
--header "Authorization: Bearer insert_token_here"
{
"_benchmark": 0.037082,
"_meta": {
"timestamp": "2025-08-25T14:45:29.916788664Z",
"total_documents": 1
},
"data": [
{
"cpe": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe_struct": {
"part": "h",
"vendor": "mediatek",
"product": "mt6890",
"version": "-",
"update": "*",
"edition": "*",
"language": "*",
"sw_edition": "*",
"target_sw": "*",
"target_hw": "*",
"other": "*"
},
"cves": [
"CVE-2021-40148",
"CVE-2022-20035",
"CVE-2022-20036",
"CVE-2022-20037",
"CVE-2022-20040",
"CVE-2022-20051",
"CVE-2022-20052",
"CVE-2022-20053",
"CVE-2022-20068",
"CVE-2022-20070",
"CVE-2022-20072",
"CVE-2022-20074",
"CVE-2022-20083",
"CVE-2022-21744",
"CVE-2022-21749",
"CVE-2022-21755",
"CVE-2022-21756",
"CVE-2022-21758",
"CVE-2022-21763",
"CVE-2022-21764",
"CVE-2022-21773",
"CVE-2022-26446",
"CVE-2023-20694",
"CVE-2023-20695",
"CVE-2023-20696",
"CVE-2023-20725",
"CVE-2023-20726",
"CVE-2023-20775",
"CVE-2023-20790",
"CVE-2023-20796",
"CVE-2023-20820",
"CVE-2023-20821",
"CVE-2023-20828",
"CVE-2023-20829",
"CVE-2023-20830",
"CVE-2023-20831",
"CVE-2023-20832",
"CVE-2023-20838",
"CVE-2023-32810",
"CVE-2023-32812",
"CVE-2023-32813",
"CVE-2023-32814",
"CVE-2023-32815",
"CVE-2023-32831",
"CVE-2023-32840",
"CVE-2023-32841",
"CVE-2023-32842",
"CVE-2023-32843",
"CVE-2023-32844",
"CVE-2023-32845",
"CVE-2023-32846",
"CVE-2023-32855",
"CVE-2023-32871",
"CVE-2023-32874",
"CVE-2023-32886",
"CVE-2023-32887",
"CVE-2023-32888",
"CVE-2023-32890",
"CVE-2023-32891",
"CVE-2024-20003",
"CVE-2024-20004",
"CVE-2024-20006",
"CVE-2024-20017",
"CVE-2024-20022",
"CVE-2024-20023",
"CVE-2024-20039",
"CVE-2024-20040",
"CVE-2024-20049",
"CVE-2024-20050",
"CVE-2024-20051",
"CVE-2024-20052",
"CVE-2024-20053",
"CVE-2024-20054",
"CVE-2024-20056",
"CVE-2024-20071",
"CVE-2024-20072",
"CVE-2024-20073",
"CVE-2024-20080",
"CVE-2024-20081",
"CVE-2024-20082",
"CVE-2024-20084",
"CVE-2024-20085",
"CVE-2024-20094",
"CVE-2024-20104",
"CVE-2024-20107",
"CVE-2024-20136",
"CVE-2024-20143",
"CVE-2024-20144",
"CVE-2024-20145",
"CVE-2024-20150",
"CVE-2025-20635",
"CVE-2025-20644",
"CVE-2025-20646",
"CVE-2025-20649",
"CVE-2025-20650",
"CVE-2025-20651",
"CVE-2025-20654",
"CVE-2025-20659",
"CVE-2025-20666",
"CVE-2025-20667",
"CVE-2025-20674",
"CVE-2025-20678",
"CVE-2025-20681",
"CVE-2025-20682",
"CVE-2025-20683",
"CVE-2025-20685",
"CVE-2025-20686",
"CVE-2025-20688",
"CVE-2025-20689",
"CVE-2025-20690",
"CVE-2025-20691",
"CVE-2025-20692"
]
}
]
}