Vulnerabilites related to netgear - prosafe_wnap210_firmware
Vulnerability from fkie_nvd
Published
2011-04-10 02:55
Modified
2024-11-21 01:26
Severity ?
Summary
BackupConfig.php on the NetGear ProSafe WNAP210 allows remote attackers to obtain the administrator password by reading the configuration file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netgear | prosafe_wnap210 | * | |
netgear | prosafe_wnap210_firmware | 2.0.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:prosafe_wnap210:*:*:*:*:*:*:*:*", "matchCriteriaId": "D26C28C4-55EF-42BE-91B4-8488D1D74CB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:netgear:prosafe_wnap210_firmware:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "70E6C9D2-A0AE-43A5-96EC-BF76129B7E92", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "BackupConfig.php on the NetGear ProSafe WNAP210 allows remote attackers to obtain the administrator password by reading the configuration file." }, { "lang": "es", "value": "BackupConfig.php en NetGear ProSafe WNAP210 permite a atacantes remotos obtener la contrase\u00f1a de administrador mediante la lectura del archivo de configuraci\u00f3n." } ], "id": "CVE-2011-1673", "lastModified": "2024-11-21T01:26:46.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-04-10T02:55:01.727", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44045" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66817" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66817" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-04-10 02:55
Modified
2024-11-21 01:26
Severity ?
Summary
The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netgear | prosafe_wnap210 | * | |
netgear | prosafe_wnap210_firmware | 2.0.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:prosafe_wnap210:*:*:*:*:*:*:*:*", "matchCriteriaId": "D26C28C4-55EF-42BE-91B4-8488D1D74CB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:netgear:prosafe_wnap210_firmware:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "70E6C9D2-A0AE-43A5-96EC-BF76129B7E92", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php." }, { "lang": "es", "value": "The NetGear ProSafe WNAP210 con firmware v2.0.12 permite a atacantes remotos eludir la autenticaci\u00f3n y obtener acceso a la p\u00e1gina de configuraci\u00f3n visitando recreate.php y despu\u00e9s visitando index.php." } ], "id": "CVE-2011-1674", "lastModified": "2024-11-21T01:26:46.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-04-10T02:55:01.790", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44045" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66723" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-1674
Vulnerability from cvelistv5
Published
2011-04-10 01:29
Modified
2024-08-06 22:37
Severity ?
EPSS score ?
Summary
The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/66723 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/644812 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0884 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/44045 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "prosafe-recreate-security-bypass(66723)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66723" }, { "name": "VU#644812", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "name": "ADV-2011-0884", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "name": "44045", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "prosafe-recreate-security-bypass(66723)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66723" }, { "name": "VU#644812", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "name": "ADV-2011-0884", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "name": "44045", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44045" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1674", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "prosafe-recreate-security-bypass(66723)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66723" }, { "name": "VU#644812", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/644812" }, { "name": "ADV-2011-0884", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "name": "44045", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44045" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1674", "datePublished": "2011-04-10T01:29:00", "dateReserved": "2011-04-09T00:00:00", "dateUpdated": "2024-08-06T22:37:25.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1673
Vulnerability from cvelistv5
Published
2011-04-10 01:29
Modified
2024-08-06 22:37
Severity ?
EPSS score ?
Summary
BackupConfig.php on the NetGear ProSafe WNAP210 allows remote attackers to obtain the administrator password by reading the configuration file.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/66817 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/644812 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0884 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/44045 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:24.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "prosafe-backupconfig-info-disc(66817)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66817" }, { "name": "VU#644812", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "name": "ADV-2011-0884", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "name": "44045", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "BackupConfig.php on the NetGear ProSafe WNAP210 allows remote attackers to obtain the administrator password by reading the configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "prosafe-backupconfig-info-disc(66817)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66817" }, { "name": "VU#644812", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/644812" }, { "name": "ADV-2011-0884", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "name": "44045", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44045" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1673", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BackupConfig.php on the NetGear ProSafe WNAP210 allows remote attackers to obtain the administrator password by reading the configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "prosafe-backupconfig-info-disc(66817)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66817" }, { "name": "VU#644812", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/644812" }, { "name": "ADV-2011-0884", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0884" }, { "name": "44045", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44045" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1673", "datePublished": "2011-04-10T01:29:00", "dateReserved": "2011-04-09T00:00:00", "dateUpdated": "2024-08-06T22:37:24.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }