diff --git a/doc/cna_readme_notes/cnas_with_html_advisories.md b/doc/cna_readme_notes/cnas_with_html_advisories.md
index 7f9f444..396455e 100644
--- a/doc/cna_readme_notes/cnas_with_html_advisories.md
+++ b/doc/cna_readme_notes/cnas_with_html_advisories.md
@@ -491,6 +491,28 @@ https://cert.vde.com/en/advisories/
### Advisory
https://www.checkpoint.com/advisories/
#### Captured Data Potential From Advisory
+```
+{
+ :bulletin_id => 'CPAI-2022-0251',
+ :date_published => 'May 19, 2022',
+ :severity => 'Critical',
+ :last_updated => 'Thursday 19 May, 2022',
+ :source => '',
+ :cve_id => 'CVE-2022-30525',
+ :protection_provided_by => 'Security Gateway R81, R80, R77, R75',
+ :who_is_vulnerable => [
+ 'Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1',
+ 'Zyxel USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1',
+ 'Zyxel USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1',
+ 'Zyxel USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1',
+ 'Zyxel USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1',
+ 'Zyxel USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1',
+ 'Zyxel ATP series firmware versions 5.10 through 5.21 Patch 1',
+ 'Zyxel VPN series firmware versions 4.60 through 5.21 Patch 1'
+ ],
+ :vulnerability_description => 'A command injection vulnerability exists in Zyxel USG. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system.'
+}
+```
## Chrome
### Advisory