Based on the specified CPE (Common Platform Enumeration) schema, this endpoint will allow searches on the attributes part, vendor, product, and/or version and return a list of associated vulnerabilities.
All search fields are optional. Attributes must conform to the specifications in the NIST CPE Specification.
application, operating system, or hardware. If not specified, all parts will be searched.*.
e.g.version=8 will only return CPEs with the exact version string 8.version=8.0.6* will return any CPE starting with 8.0.6.cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* is listed in many CVEs as part of a vulnerable configuration, but only one where the the device itself is inherently vulnerable.isVulnerable=true - Return only the CVEs where the CPE is vulnerable.curl --request GET \
--url "https://api.vulncheck.com/v3/search/cpe?vendor=mediatek&product=mt6890&version=*&isVulnerable=true" \
--header "Accept: application/json" \
--header "Authorization: Bearer insert_token_here"
{
"_benchmark": 0.064753,
"_meta": {
"timestamp": "2025-08-25T14:45:54.678582963Z",
"total_documents": 1
},
"data": [
{
"cpe": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe_struct": {
"part": "h",
"vendor": "mediatek",
"product": "mt6890",
"version": "-",
"update": "*",
"edition": "*",
"language": "*",
"sw_edition": "*",
"target_sw": "*",
"target_hw": "*",
"other": "*"
},
"cves": [
"CVE-2025-20654"
]
}
]
}
curl --request GET \
--url "https://api.vulncheck.com/v3/search/cpe?vendor=mediatek&product=mt6890&version=*" \
--header "Accept: application/json" \
--header "Authorization: Bearer insert_token_here"
{
"_benchmark": 0.037082,
"_meta": {
"timestamp": "2025-08-25T14:45:29.916788664Z",
"total_documents": 1
},
"data": [
{
"cpe": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe_struct": {
"part": "h",
"vendor": "mediatek",
"product": "mt6890",
"version": "-",
"update": "*",
"edition": "*",
"language": "*",
"sw_edition": "*",
"target_sw": "*",
"target_hw": "*",
"other": "*"
},
"cves": [
"CVE-2021-40148",
"CVE-2022-20035",
"CVE-2022-20036",
"CVE-2022-20037",
"CVE-2022-20040",
"CVE-2022-20051",
"CVE-2022-20052",
"CVE-2022-20053",
"CVE-2022-20068",
"CVE-2022-20070",
"CVE-2022-20072",
"CVE-2022-20074",
"CVE-2022-20083",
"CVE-2022-21744",
"CVE-2022-21749",
"CVE-2022-21755",
"CVE-2022-21756",
"CVE-2022-21758",
"CVE-2022-21763",
"CVE-2022-21764",
"CVE-2022-21773",
"CVE-2022-26446",
"CVE-2023-20694",
"CVE-2023-20695",
"CVE-2023-20696",
"CVE-2023-20725",
"CVE-2023-20726",
"CVE-2023-20775",
"CVE-2023-20790",
"CVE-2023-20796",
"CVE-2023-20820",
"CVE-2023-20821",
"CVE-2023-20828",
"CVE-2023-20829",
"CVE-2023-20830",
"CVE-2023-20831",
"CVE-2023-20832",
"CVE-2023-20838",
"CVE-2023-32810",
"CVE-2023-32812",
"CVE-2023-32813",
"CVE-2023-32814",
"CVE-2023-32815",
"CVE-2023-32831",
"CVE-2023-32840",
"CVE-2023-32841",
"CVE-2023-32842",
"CVE-2023-32843",
"CVE-2023-32844",
"CVE-2023-32845",
"CVE-2023-32846",
"CVE-2023-32855",
"CVE-2023-32871",
"CVE-2023-32874",
"CVE-2023-32886",
"CVE-2023-32887",
"CVE-2023-32888",
"CVE-2023-32890",
"CVE-2023-32891",
"CVE-2024-20003",
"CVE-2024-20004",
"CVE-2024-20006",
"CVE-2024-20017",
"CVE-2024-20022",
"CVE-2024-20023",
"CVE-2024-20039",
"CVE-2024-20040",
"CVE-2024-20049",
"CVE-2024-20050",
"CVE-2024-20051",
"CVE-2024-20052",
"CVE-2024-20053",
"CVE-2024-20054",
"CVE-2024-20056",
"CVE-2024-20071",
"CVE-2024-20072",
"CVE-2024-20073",
"CVE-2024-20080",
"CVE-2024-20081",
"CVE-2024-20082",
"CVE-2024-20084",
"CVE-2024-20085",
"CVE-2024-20094",
"CVE-2024-20104",
"CVE-2024-20107",
"CVE-2024-20136",
"CVE-2024-20143",
"CVE-2024-20144",
"CVE-2024-20145",
"CVE-2024-20150",
"CVE-2025-20635",
"CVE-2025-20644",
"CVE-2025-20646",
"CVE-2025-20649",
"CVE-2025-20650",
"CVE-2025-20651",
"CVE-2025-20654",
"CVE-2025-20659",
"CVE-2025-20666",
"CVE-2025-20667",
"CVE-2025-20674",
"CVE-2025-20678",
"CVE-2025-20681",
"CVE-2025-20682",
"CVE-2025-20683",
"CVE-2025-20685",
"CVE-2025-20686",
"CVE-2025-20688",
"CVE-2025-20689",
"CVE-2025-20690",
"CVE-2025-20691",
"CVE-2025-20692"
]
}
]
}