Vulnerabilites related to netgear - wndap350
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por una vulnerabilidad de tipo CSRF. Esto afecta a WAC120 versiones anteriores a 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11. 4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5, y WN604 versiones anteriores a 3.3.10." } ], "id": "CVE-2018-21096", "lastModified": "2024-11-21T04:02:53.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T16:15:12.663", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28BEFA11-71A8-4FDF-BC54-5AF4D359FF49", "versionEndExcluding": "3.3.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A390A970-3C56-4682-853C-16335E95FD9E", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D36B032D-EB59-40BC-8D04-1AE8746293A8", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5A85E15-3359-4500-808E-D05160C96A5D", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3921F047-FEC6-4AE0-BC6A-B24795970675", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E8F2DEA-7095-451B-90FD-1D94285EC0FC", "versionEndExcluding": "2.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E07F80-C2B1-45E6-BBC9-0CD8B598E2C8", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7D131-F0A6-42BE-B119-20E0A9FCAD34", "versionEndExcluding": "2.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49AFDA75-C33C-421E-B4D7-449570944007", "versionEndExcluding": "2.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por una ejecuci\u00f3n de comandos por medio de un formulario PHP. Esto afecta a WN604 versiones 3.3.3 y anteriores, WNAP210v2 versiones 3.5.20.0 y anteriores, WNAP320 versiones 3.5.20.0 y anteriores, WNDAP350 versiones 3.5.20.0 y anteriores, WNDAP360 versiones 3.5.20.0 y anteriores, WNDAP620 versiones 2.0.11 y anteriores, WNDAP660 versiones 3.5.20.0 y anteriores, WND930 versiones 2.0.11 y anteriores, y WAC120 versiones 2.0.7 y anteriores." } ], "id": "CVE-2017-18863", "lastModified": "2024-11-21T03:21:07.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-28T16:15:12.747", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una vulnerabilidad de tipo CSRF. Esto afecta a WAC120 versiones anteriores a 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11.4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5 y WN604 versiones anteriores a 3.3.10." } ], "id": "CVE-2018-21120", "lastModified": "2024-11-21T04:02:56.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-22T16:15:11.903", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "806B48FE-912E-488A-A89A-3321BF14B351", "versionEndExcluding": "1.3.0.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD64ACCC-A1E0-4D9F-B6E4-8AB8AD7936E5", "versionEndExcluding": "2.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9267B577-EF4D-43A5-BC91-CB363F8EA421", "versionEndExcluding": "2.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7CFEDD-259B-4E40-9308-A071D236D4C7", "versionEndExcluding": "2.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEBD44BB-11A5-45C8-A675-E9CBBB31C48F", "versionEndExcluding": "3.3.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "965D072C-3F4F-49EB-93DB-377E91372214", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E3E920F-B954-4D9F-A918-214A00785A9A", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B6AA52-F11E-4836-AF1D-7682FBD56CA4", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFC5C872-DEC5-47EF-AA32-7D82E8DB9E48", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46CB6AD-BCE4-4A82-B2CC-22190AEB2F3B", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una inyecci\u00f3n de comando. Esto afecta a WAC510 versiones anteriores a la versi\u00f3n 1.3.0.10, WAC120 versiones anteriores a la versi\u00f3n 2.1.4, WNDAP620 versiones anteriores a la versi\u00f3n 2.1.3, WND930 versiones anteriores a la versi\u00f3n 2.1.2, WN604 versiones anteriores a la 3.3. 7, WNDAP660 versiones anteriores a 3.7.4.0, WNDAP350 versiones anteriores a 3.7.4.0, WNAP320 versiones anteriores a 3.7.4.0, WNAP210v2 versiones anteriores a 3.7.4.0, y WNDAP360 versiones anteriores a 3.7.4.0." } ], "id": "CVE-2017-18805", "lastModified": "2024-11-21T03:20:58.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-21T18:15:12.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "806B48FE-912E-488A-A89A-3321BF14B351", "versionEndExcluding": "1.3.0.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD64ACCC-A1E0-4D9F-B6E4-8AB8AD7936E5", "versionEndExcluding": "2.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9267B577-EF4D-43A5-BC91-CB363F8EA421", "versionEndExcluding": "2.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7CFEDD-259B-4E40-9308-A071D236D4C7", "versionEndExcluding": "2.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEBD44BB-11A5-45C8-A675-E9CBBB31C48F", "versionEndExcluding": "3.3.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "965D072C-3F4F-49EB-93DB-377E91372214", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E3E920F-B954-4D9F-A918-214A00785A9A", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B6AA52-F11E-4836-AF1D-7682FBD56CA4", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFC5C872-DEC5-47EF-AA32-7D82E8DB9E48", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46CB6AD-BCE4-4A82-B2CC-22190AEB2F3B", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR, est\u00e1n afectados por una inyecci\u00f3n de comandos. Esto afecta a WAC510 versiones anteriores a la versi\u00f3n 1.3.0.10, WAC120 versiones anteriores a la versi\u00f3n 2.1.4, WNDAP620 versiones anteriores a la versi\u00f3n 2.1.3, WND930 versiones anteriores a la versi\u00f3n 2.1.2, WN604 versiones anteriores a la versi\u00f3n 3.3. 7, WNDAP660 versiones anteriores a la versi\u00f3n 3.7.4.0, WNDAP350 versiones anteriores a la versi\u00f3n 3.7.4.0, WNAP320 versiones anteriores a la versi\u00f3n 3.7.4.0, WNAP210v2 versiones anteriores a la versi\u00f3n 3.7.4.0, y WNDAP360 versiones anteriores a la versi\u00f3n 3.7.4.0." } ], "id": "CVE-2017-18806", "lastModified": "2024-11-21T03:20:58.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-21T16:15:51.337", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria por parte de un atacante no autenticado. Esto afecta a WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WAC120 versiones anteriores a 2.1.7, WN604 versiones anteriores a 3.3.10, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3. 7.11.4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, y WND930 versiones anteriores a 2.1.5." } ], "id": "CVE-2018-21097", "lastModified": "2024-11-21T04:02:53.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T16:15:12.710", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap210v2_firmware | * | |
netgear | wndap210v2 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wn802tv2_firmware | * | |
netgear | wn802tv2 | - |
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "NETGEAR Multiple WAP Devices Command Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBCE4D2F-5A11-4043-8F3E-4C10D155A6ED", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB422D25-D72D-445B-869D-4A5FBF285357", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E8F1E-AB78-4C4B-BE0B-AE17E4636077", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap210v2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9801E95C-9464-4594-B4E8-6F227C597C27", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap210v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1AD5A1-5212-4C0A-88BB-F34314F9C037", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA9CFC3-D7D5-4538-AA31-9C4504E5AFA7", "versionEndIncluding": "3.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99E67C3D-8907-4A96-BBAA-128959DB3962", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn802tv2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "169F7661-BB39-4188-A26E-9791FCE1DA6B", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn802tv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "05B05670-CC01-4F53-B1A7-83FE3AFBA12E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands." }, { "lang": "es", "value": "(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, y (5) boardDataWW.php en Netgear WN604 en versiones anteriores a 3.3.3 y WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360 y WNDAP660 en versiones anteriores a 3.5.5.0 permite a atacantes remotos ejecutar comandos arbitrarios." } ], "id": "CVE-2016-1555", "lastModified": "2025-02-19T19:45:56.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2017-04-21T15:59:00.333", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45909/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45909/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una configuraci\u00f3n incorrecta de los ajustes de seguridad. Esto afecta a WAC120 versiones anteriores a la versi\u00f3n 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11. 4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5, y WN604 versiones anteriores a 3.3.10." } ], "id": "CVE-2018-21094", "lastModified": "2024-11-21T04:02:53.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T15:15:12.143", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | Third Party Advisory, VDB Entry | |
cret@cert.org | http://seclists.org/fulldisclosure/2016/Feb/112 | Mailing List, Third Party Advisory | |
cret@cert.org | https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Feb/112 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBCE4D2F-5A11-4043-8F3E-4C10D155A6ED", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB422D25-D72D-445B-869D-4A5FBF285357", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E8F1E-AB78-4C4B-BE0B-AE17E4636077", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP." }, { "lang": "es", "value": "Netgear WNAP320, WNDAP350 y WNDAP360 en versiones anteriores a 3.5.5.0 revelan contrase\u00f1as inal\u00e1mbricas y nombres de usuario y contrase\u00f1as administrativos sobre SNMP." } ], "id": "CVE-2016-1557", "lastModified": "2024-11-21T02:46:38.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-21T15:59:00.410", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | Third Party Advisory, VDB Entry | |
cret@cert.org | http://seclists.org/fulldisclosure/2016/Feb/112 | Mailing List, Third Party Advisory | |
cret@cert.org | https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Feb/112 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap210v2_firmware | * | |
netgear | wndap210v2 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBCE4D2F-5A11-4043-8F3E-4C10D155A6ED", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB422D25-D72D-445B-869D-4A5FBF285357", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E8F1E-AB78-4C4B-BE0B-AE17E4636077", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap210v2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9801E95C-9464-4594-B4E8-6F227C597C27", "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap210v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1AD5A1-5212-4C0A-88BB-F34314F9C037", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA9CFC3-D7D5-4538-AA31-9C4504E5AFA7", "versionEndIncluding": "3.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B71DF419-B28F-4B6A-8404-420326DFC2BE", "versionEndIncluding": "2.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n en Netgear WN604 en versiones anteriores a 3.3.3; WNAP210, WNAP320, WNDAP350 y WNDAP360 en versiones anteriores a 3.5.5.0; y WND930 en versiones anteriores a 2.0.11 permite a los atacantes remotos leer el PIN o frase de acceso WPS inal\u00e1mbrico visitando p\u00e1ginas web no autenticadas." } ], "id": "CVE-2016-1556", "lastModified": "2024-11-21T02:46:37.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-21T15:59:00.363", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202004-1556
Vulnerability from variot
Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the WEB application does not fully verify whether the request comes from a trusted user. An attacker can use this vulnerability to send unexpected requests to the server through the affected client
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1556", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac505", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.5" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.5" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.11.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016301" } ] }, "cve": "CVE-2018-21120", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CVE-2018-21120", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016301", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CNVD-2021-59162", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "id": "CVE-2018-21120", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.5, "id": "CVE-2018-21120", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-016301", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21120", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2018-21120", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2018-016301", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-59162", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202004-1917", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the WEB application does not fully verify whether the request comes from a trusted user. An attacker can use this vulnerability to send unexpected requests to the server through the affected client", "sources": [ { "db": "NVD", "id": "CVE-2018-21120" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNVD", "id": "CNVD-2021-59162" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21120", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2018-016301", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-59162", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1917", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "id": "VAR-202004-1556", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" } ], "trust": 1.065498345 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" } ] }, "last_update_date": "2024-11-23T22:48:01.387000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Cross Site Request Forgery on Some Wireless Access Points, PSV-2018-0095", "trust": 0.8, "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" }, { "title": "Patch for Cross-site request forgery vulnerability in multiple NETGEAR products (CNVD-2021-59162)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/284356" }, { "title": "Multiple NETGEAR Repair measures for product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117250" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21120" }, { "trust": 1.6, "url": "https://kb.netgear.com/000060238/security-advisory-for-cross-site-request-forgery-on-some-wireless-access-points-psv-2018-0095" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21120" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59162" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "date": "2020-04-22T16:15:11.903000", "db": "NVD", "id": "CVE-2018-21120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59162" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "date": "2020-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "date": "2024-11-21T04:02:56.987000", "db": "NVD", "id": "CVE-2018-21120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1917" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Cross-site request forgery vulnerability in device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016301" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1917" } ], "trust": 0.6 } }
var-202004-1515
Vulnerability from variot
Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier. plural NETGEAR The product contains an injection vulnerability.Information may be obtained and tampered with. This affects WN604 3.3.3 and previous versions, WNAP210v2 3.5.20.0 and previous versions, WNAP320 3.5.20.0 and previous versions, WNDAP350 3.5.20.0 and previous versions, WNDAP360 3.5.20.0 and previous versions, WNDAP620 2.0.11 and previous versions, WNDAP660 3.5.20.0 and previous versions, WND930 2.0.11 and previous versions, and WAC120 2.0.7 and previous versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1515", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap660", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wn604", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.3.3" }, { "model": "wac120", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.7" }, { "model": "wndap360", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.0.7" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.3" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" } ] }, "cve": "CVE-2017-18863", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-18863", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-014995", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-18863", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-014995", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18863", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2017-014995", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2262", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-18863", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier. plural NETGEAR The product contains an injection vulnerability.Information may be obtained and tampered with. This affects WN604 3.3.3 and previous versions, WNAP210v2 3.5.20.0 and previous versions, WNAP320 3.5.20.0 and previous versions, WNDAP350 3.5.20.0 and previous versions, WNDAP360 3.5.20.0 and previous versions, WNDAP620 2.0.11 and previous versions, WNDAP660 3.5.20.0 and previous versions, WND930 2.0.11 and previous versions, and WAC120 2.0.7 and previous versions", "sources": [ { "db": "NVD", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "VULMON", "id": "CVE-2017-18863" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18863", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2017-014995", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2262", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-18863", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "id": "VAR-202004-1515", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4443443822222222 }, "last_update_date": "2024-11-23T22:29:38.886000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for PHP Vulnerabilities on Wireless Access Points, PSV-2017-0517 and PSV-2016-0258", "trust": 0.8, "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" }, { "title": "Multiple NETGEAR Fixing measures for product injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117741" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.netgear.com/000037827/security-advisory-for-php-vulnerabilities-on-wireless-access-points-psv-2017-0517-and-psv-2016-0258" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18863" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18863" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/74.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-28T00:00:00", "db": "VULMON", "id": "CVE-2017-18863" }, { "date": "2020-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "date": "2020-04-28T16:15:12.747000", "db": "NVD", "id": "CVE-2017-18863" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-05T00:00:00", "db": "VULMON", "id": "CVE-2017-18863" }, { "date": "2020-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "date": "2020-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "date": "2024-11-21T03:21:07.387000", "db": "NVD", "id": "CVE-2017-18863" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2262" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Product injection vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2262" } ], "trust": 0.6 } }
var-202004-1371
Vulnerability from variot
Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.3" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.2" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.7" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014893" } ] }, "cve": "CVE-2017-18806", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-18806", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-014893", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2021-52966", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18806", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18806", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-014893", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18806", "trust": 1.0, "value": "MEDIUM" }, { "author": "cve@mitre.org", "id": "CVE-2017-18806", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2017-014893", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-52966", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "NVD", "id": "CVE-2017-18806" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2017-18806" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNVD", "id": "CNVD-2021-52966" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18806", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2017-014893", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-52966", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1835", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "id": "VAR-202004-1371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" } ], "trust": 1.0737637281818182 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" } ] }, "last_update_date": "2024-11-23T23:07:58.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Command Injection Vulnerability on Some Wireless Access Points, PSV-2017-2214", "trust": 0.8, "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" }, { "title": "Patch for NETGEAR command injection vulnerability (CNVD-2021-52966)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/280076" }, { "title": "Multiple NETGEAR Product Command Injection Vulnerability Fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116311" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18806" }, { "trust": 1.6, "url": "https://kb.netgear.com/000049061/security-advisory-for-command-injection-vulnerability-on-some-wireless-access-points-psv-2017-2214" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18806" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2021-52966" }, { "date": "2020-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "date": "2020-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "date": "2020-04-21T16:15:51.337000", "db": "NVD", "id": "CVE-2017-18806" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2021-52966" }, { "date": "2020-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "date": "2024-11-21T03:20:58.387000", "db": "NVD", "id": "CVE-2017-18806" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Injection vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1835" } ], "trust": 0.6 } }
var-202004-1530
Vulnerability from variot
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1530", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wnd930", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.5" }, { "model": "wn604", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.3.10" }, { "model": "wac510", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac505", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap320", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.5" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.7" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac505", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.3" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" } ] }, "cve": "CVE-2018-21094", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-21094", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016405", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-21094", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cve@mitre.org", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-21094", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-016405", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21094", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2018-21094", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2018-016405", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2173", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-21094", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10", "sources": [ { "db": "NVD", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "VULMON", "id": "CVE-2018-21094" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21094", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-016405", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2173", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-21094", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "id": "VAR-202004-1530", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4320588036363637 }, "last_update_date": "2024-11-23T23:01:24.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for a Security Misconfiguration on Some Wireless Access Points, PSV-2018-0350", "trust": 0.8, "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" }, { "title": "Multiple NETGEAR Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117280" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.netgear.com/000060460/security-advisory-for-a-security-misconfiguration-on-some-wireless-access-points-psv-2018-0350" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21094" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21094" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2018-21094" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "date": "2020-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "date": "2020-04-27T15:15:12.143000", "db": "NVD", "id": "CVE-2018-21094" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-21094" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "date": "2024-11-21T04:02:53.217000", "db": "NVD", "id": "CVE-2018-21094" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2173" } ], "trust": 0.6 } }
var-201704-0304
Vulnerability from variot
Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages. Netgear is the world's leading enterprise network solution and advocate for digital home networking applications. There are information disclosure vulnerabilities in Netgear's various devices. The device bypasses the authentication page, and the attacker can use the vulnerability to obtain sensitive information such as wireless WPSPIN. NETGEAR WN604 is a wireless access point (AP) of NETGEAR. The following products and versions are affected: Netgear WN604 prior to 3.3.3; WNAP210 prior to 3.5.5.0, WNAP320 prior to 3.5.5.0, WNDAP350 prior to 3.5.5.0, WNDAP360 prior to 3.5.5.0; WND930 2.0 Versions prior to .11
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0304", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap350", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnd930", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "2.0.4" }, { "model": "wndap360", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap210v2", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.3.2" }, { "model": "wn604", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.3.3" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnap320", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnd930", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "2.0.11" }, { "model": "wndap350", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap360", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wn604", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnap210", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnap320", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap350", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.3.2" }, { "model": "wndap210v2", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "2.0.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNNVD", "id": "CNNVD-201604-395" }, { "db": "NVD", "id": "CVE-2016-1556" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap210v2_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008524" } ] }, "cve": "CVE-2016-1556", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-1556", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-01690", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-90375", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-1556", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1556", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-1556", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-01690", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-395", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90375", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "VULHUB", "id": "VHN-90375" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNNVD", "id": "CNNVD-201604-395" }, { "db": "NVD", "id": "CVE-2016-1556" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages. Netgear is the world\u0027s leading enterprise network solution and advocate for digital home networking applications. There are information disclosure vulnerabilities in Netgear\u0027s various devices. The device bypasses the authentication page, and the attacker can use the vulnerability to obtain sensitive information such as wireless WPSPIN. NETGEAR WN604 is a wireless access point (AP) of NETGEAR. The following products and versions are affected: Netgear WN604 prior to 3.3.3; WNAP210 prior to 3.5.5.0, WNAP320 prior to 3.5.5.0, WNDAP350 prior to 3.5.5.0, WNDAP360 prior to 3.5.5.0; WND930 2.0 Versions prior to .11", "sources": [ { "db": "NVD", "id": "CVE-2016-1556" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "VULHUB", "id": "VHN-90375" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1556", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "135956", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2016-008524", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-395", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-01690", "trust": 0.6 }, { "db": "VULDB", "id": "81129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90375", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "VULHUB", "id": "VHN-90375" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNNVD", "id": "CNNVD-201604-395" }, { "db": "NVD", "id": "CVE-2016-1556" } ] }, "id": "VAR-201704-0304", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "VULHUB", "id": "VHN-90375" } ], "trust": 1.22198852 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01690" } ] }, "last_update_date": "2024-11-23T21:54:09.508000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2016-1556 - Notification", "trust": 0.8, "url": "https://kb.netgear.com/30481/CVE-2016-1556-Notification" }, { "title": "Multiple Netgear Product information disclosure vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61088" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNNVD", "id": "CNNVD-201604-395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90375" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "NVD", "id": "CVE-2016-1556" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/135956/d-link-netgear-firmadyne-command-injection-buffer-overflow.html" }, { "trust": 2.3, "url": "http://seclists.org/fulldisclosure/2016/feb/112" }, { "trust": 1.7, "url": "https://kb.netgear.com/30481/cve-2016-1556-notification?cid=wmt_netgear_organic" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1556" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1556" }, { "trust": 0.6, "url": "http://vuldb.com/?id.81129" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "VULHUB", "id": "VHN-90375" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNNVD", "id": "CNNVD-201604-395" }, { "db": "NVD", "id": "CVE-2016-1556" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01690" }, { "db": "VULHUB", "id": "VHN-90375" }, { "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "db": "CNNVD", "id": "CNNVD-201604-395" }, { "db": "NVD", "id": "CVE-2016-1556" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01690" }, { "date": "2017-04-21T00:00:00", "db": "VULHUB", "id": "VHN-90375" }, { "date": "2017-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "date": "2016-03-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-395" }, { "date": "2017-04-21T15:59:00.363000", "db": "NVD", "id": "CVE-2016-1556" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01690" }, { "date": "2017-04-28T00:00:00", "db": "VULHUB", "id": "VHN-90375" }, { "date": "2017-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008524" }, { "date": "2017-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-395" }, { "date": "2024-11-21T02:46:37.960000", "db": "NVD", "id": "CVE-2016-1556" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Netgear Information disclosure vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008524" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-395" } ], "trust": 0.6 } }
var-202004-1532
Vulnerability from variot
Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1532", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wnd930", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.5" }, { "model": "wn604", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.3.10" }, { "model": "wac510", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac505", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap320", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.5" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.7" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac505", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.3" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" } ] }, "cve": "CVE-2018-21096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.4, "id": "CVE-2018-21096", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.9, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016402", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.5, "id": "CVE-2018-21096", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.5, "id": "CVE-2018-21096", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-016402", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21096", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2018-21096", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2018-016402", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2185", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-21096", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10", "sources": [ { "db": "NVD", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "VULMON", "id": "CVE-2018-21096" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21096", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-016402", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2185", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-21096", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "id": "VAR-202004-1532", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4320588036363637 }, "last_update_date": "2024-11-23T22:37:24.872000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Cross Site Request Forgery on Some Wireless Access Points, PSV-2018-0096", "trust": 0.8, "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" }, { "title": "Multiple NETGEAR Repair measures for product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117708" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.netgear.com/000060455/security-advisory-for-cross-site-request-forgery-on-some-wireless-access-points-psv-2018-0096" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21096" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21096" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2018-21096" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "date": "2020-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "date": "2020-04-27T16:15:12.663000", "db": "NVD", "id": "CVE-2018-21096" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-21096" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "date": "2024-11-21T04:02:53.510000", "db": "NVD", "id": "CVE-2018-21096" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Cross-site request forgery vulnerability in device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2185" } ], "trust": 0.6 } }
var-201106-0319
Vulnerability from variot
The NetGear WNDAP350 is a wireless access device. The NetGear WNDAP350 wireless access point lacks the correct restrictions on access. An attacker can exploit the vulnerability to obtain sensitive information, including plain text management passwords or WPA ciphertext, through the download.php or BackupConfig.php script. WNDAP350 with firmware 2.0.1 and 2.0.9 are vulnerable; other firmware versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201106-0319", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap350", "scope": "eq", "trust": 0.9, "vendor": "netgear", "version": "2.0.1" }, { "model": "wndap350", "scope": "eq", "trust": 0.9, "vendor": "netgear", "version": "2.0.9" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" }, { "db": "BID", "id": "48085" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juerd Waalboer", "sources": [ { "db": "BID", "id": "48085" } ], "trust": 0.3 }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NetGear WNDAP350 is a wireless access device. The NetGear WNDAP350 wireless access point lacks the correct restrictions on access. An attacker can exploit the vulnerability to obtain sensitive information, including plain text management passwords or WPA ciphertext, through the download.php or BackupConfig.php script. \nWNDAP350 with firmware 2.0.1 and 2.0.9 are vulnerable; other firmware versions may also be affected", "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" }, { "db": "BID", "id": "48085" } ], "trust": 0.81 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "48085", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2011-2077", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" }, { "db": "BID", "id": "48085" } ] }, "id": "VAR-201106-0319", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" } ], "trust": 1.08863637 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" } ] }, "last_update_date": "2022-05-17T02:00:11.492000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.6, "url": "http://www.securityfocus.com/bid/48085https" }, { "trust": 0.3, "url": "http://www.netgear.com/" }, { "trust": 0.3, "url": "https://revspace.nl/revelationspace/newsitem11x05x30x0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" }, { "db": "BID", "id": "48085" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-2077" }, { "db": "BID", "id": "48085" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2011-2077" }, { "date": "2011-06-01T00:00:00", "db": "BID", "id": "48085" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-06-02T00:00:00", "db": "CNVD", "id": "CNVD-2011-2077" }, { "date": "2011-06-01T00:00:00", "db": "BID", "id": "48085" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "48085" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NetGear WNDAP350 Wireless Access Point Information Disclosure Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2011-2077" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "48085" } ], "trust": 0.3 } }
var-202004-1318
Vulnerability from variot
Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1318", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.4" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.2" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.7" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.3" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014895" } ] }, "cve": "CVE-2017-18805", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-18805", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-014895", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2021-57167", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18805", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18805", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-014895", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18805", "trust": 1.0, "value": "MEDIUM" }, { "author": "cve@mitre.org", "id": "CVE-2017-18805", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2017-014895", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-57167", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "NVD", "id": "CVE-2017-18805" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2017-18805" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNVD", "id": "CNVD-2021-57167" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18805", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2017-014895", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-57167", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1815", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "id": "VAR-202004-1318", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" } ], "trust": 1.0737637281818182 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" } ] }, "last_update_date": "2024-11-23T22:33:28.609000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Command Injection Vulnerability on Some Wireless Access Points, PSV-2017-2213", "trust": 0.8, "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" }, { "title": "Patch for NETGEAR command injection vulnerability (CNVD-2021-57167)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/283626" }, { "title": "Multiple NETGEAR Product Command Injection Vulnerability Fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116292" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18805" }, { "trust": 1.6, "url": "https://kb.netgear.com/000049060/security-advisory-for-command-injection-vulnerability-on-some-wireless-access-points-psv-2017-2213" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18805" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-30T00:00:00", "db": "CNVD", "id": "CNVD-2021-57167" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "date": "2020-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "date": "2020-04-21T18:15:12.593000", "db": "NVD", "id": "CVE-2017-18805" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2021-57167" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "date": "2024-11-21T03:20:58.220000", "db": "NVD", "id": "CVE-2017-18805" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Injection vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1815" } ], "trust": 0.6 } }
var-202004-1533
Vulnerability from variot
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5. plural NETGEAR The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all wireless access points (AP) of NETGEAR.
There are buffer overflow vulnerabilities in many NETGEAR products, and remote attackers can use this vulnerability to execute arbitrary code by sending specially crafted requests. This affects WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WAC120 prior to 2.1.7, WN604 prior to 3.3.10, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, and WND930 prior to 2.1.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1533", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac505", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.5" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.7" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac505", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.3" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016403" } ] }, "cve": "CVE-2018-21097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-21097", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016403", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-28140", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-21097", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cve@mitre.org", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2018-21097", "impactScore": 4.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-016403", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21097", "trust": 1.0, "value": "CRITICAL" }, { "author": "cve@mitre.org", "id": "CVE-2018-21097", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2018-016403", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-28140", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202004-2187", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2018-21097", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5. plural NETGEAR The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all wireless access points (AP) of NETGEAR. \n\r\n\r\nThere are buffer overflow vulnerabilities in many NETGEAR products, and remote attackers can use this vulnerability to execute arbitrary code by sending specially crafted requests. This affects WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WAC120 prior to 2.1.7, WN604 prior to 3.3.10, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, and WND930 prior to 2.1.5", "sources": [ { "db": "NVD", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21097", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2018-016403", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-28140", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-2187", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-21097", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "id": "VAR-202004-1533", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" } ], "trust": 1.065498345 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" } ] }, "last_update_date": "2024-11-23T23:04:24.946000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Pre-Authentication Stack Overflow on Some Wireless Access Points, PSV-2018-0094", "trust": 0.8, "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" }, { "title": "Patch for Multiple NETGEAR product buffer overflow vulnerabilities (CNVD-2020-28140)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/217425" }, { "title": "Multiple NETGEAR Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21097" }, { "trust": 1.7, "url": "https://kb.netgear.com/000060457/security-advisory-for-pre-authentication-stack-overflow-on-some-wireless-access-points-psv-2018-0094" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21097" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-14T00:00:00", "db": "CNVD", "id": "CNVD-2020-28140" }, { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2018-21097" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "date": "2020-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "date": "2020-04-27T16:15:12.710000", "db": "NVD", "id": "CVE-2018-21097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-14T00:00:00", "db": "CNVD", "id": "CNVD-2020-28140" }, { "date": "2020-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-21097" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "date": "2024-11-21T04:02:53.660000", "db": "NVD", "id": "CVE-2018-21097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Out-of-bounds write vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016403" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2187" } ], "trust": 0.6 } }
var-201704-0305
Vulnerability from variot
Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP. Netgear WNAP320 , WNDAP350 ,and WNDAP360 Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Netgear is the world's leading enterprise network solution and advocate for digital home networking applications. There are information disclosure vulnerabilities in Netgear's various devices, and an attacker can exploit the vulnerability to obtain an administrator account and a wireless password. Security flaws exist in several Netgear products. The following products and versions are affected: Netgear WNAP320 prior to 3.5.5.0; WNDAP350 prior to 3.5.5.0; WNDAP360 prior to 3.5.5.0. Hello,
We’d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at https://github.com/firmadyne/firmadyne.
Several Netgear devices include unauthenticated webpages that pass form input directly to the command-line, allowing for a command injection attack in boardData102.php
, boardData103.php
, boardDataJP.php
, boardDataNA.php
, and boardDataWW.php
. This has been assigned CVE-2016-1555. Affected devices include:
Netgear WN604 Netgear WN802Tv2 Netgear WNAP210 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360
Several D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the 'dlink_uid' cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include:
D-Link DAP-2310 D-Link DAP-2330 D-Link DAP-2360 D-Link DAP-2553 D-Link DAP-2660 D-Link DAP-2690 D-Link DAP-2695
Several Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include:
D-Link DAP-1353 D-Link DAP-2553 D-Link DAP-3520 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360
We have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March.
Thanks,
Dominic
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0305", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap360", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap350", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap360", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnap320", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap350", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "CNNVD", "id": "CNNVD-201604-393" }, { "db": "NVD", "id": "CVE-2016-1557" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008489" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dominic Chen", "sources": [ { "db": "PACKETSTORM", "id": "135956" } ], "trust": 0.1 }, "cve": "CVE-2016-1557", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-1557", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-01689", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-90376", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-1557", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1557", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-1557", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-01689", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-393", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90376", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "VULHUB", "id": "VHN-90376" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "CNNVD", "id": "CNNVD-201604-393" }, { "db": "NVD", "id": "CVE-2016-1557" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP. Netgear WNAP320 , WNDAP350 ,and WNDAP360 Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Netgear is the world\u0027s leading enterprise network solution and advocate for digital home networking applications. There are information disclosure vulnerabilities in Netgear\u0027s various devices, and an attacker can exploit the vulnerability to obtain an administrator account and a wireless password. Security flaws exist in several Netgear products. The following products and versions are affected: Netgear WNAP320 prior to 3.5.5.0; WNDAP350 prior to 3.5.5.0; WNDAP360 prior to 3.5.5.0. Hello,\n\nWe\u2019d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at https://github.com/firmadyne/firmadyne. \n\nSeveral Netgear devices include unauthenticated webpages that pass form input directly to the command-line, allowing for a command injection attack in `boardData102.php`, `boardData103.php`, `boardDataJP.php`, `boardDataNA.php`, and `boardDataWW.php`. This has been assigned CVE-2016-1555. Affected devices include:\n\nNetgear WN604\nNetgear WN802Tv2\nNetgear WNAP210\nNetgear WNAP320\nNetgear WNDAP350\nNetgear WNDAP360\n\nSeveral D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the \u0027dlink_uid\u0027 cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include:\n\nD-Link DAP-2310\nD-Link DAP-2330\nD-Link DAP-2360\nD-Link DAP-2553\nD-Link DAP-2660\nD-Link DAP-2690\nD-Link DAP-2695\n\nSeveral Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include:\n\nD-Link DAP-1353\nD-Link DAP-2553\nD-Link DAP-3520\nNetgear WNAP320\nNetgear WNDAP350\nNetgear WNDAP360\n\nWe have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March. \n\nThanks,\n\nDominic\n", "sources": [ { "db": "NVD", "id": "CVE-2016-1557" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "VULHUB", "id": "VHN-90376" }, { "db": "PACKETSTORM", "id": "135956" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1557", "trust": 3.2 }, { "db": "PACKETSTORM", "id": "135956", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-008489", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-393", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-01689", "trust": 0.6 }, { "db": "VULDB", "id": "81131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-90376", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "VULHUB", "id": "VHN-90376" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "CNNVD", "id": "CNNVD-201604-393" }, { "db": "NVD", "id": "CVE-2016-1557" } ] }, "id": "VAR-201704-0305", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "VULHUB", "id": "VHN-90376" } ], "trust": 1.1813131366666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01689" } ] }, "last_update_date": "2024-11-23T21:54:09.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2016-1557 - Notification", "trust": 0.8, "url": "https://kb.netgear.com/30482/CVE-2016-1557-Notification" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008489" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90376" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "NVD", "id": "CVE-2016-1557" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/135956/d-link-netgear-firmadyne-command-injection-buffer-overflow.html" }, { "trust": 2.3, "url": "http://seclists.org/fulldisclosure/2016/feb/112" }, { "trust": 1.7, "url": "https://kb.netgear.com/30482/cve-2016-1557-notification?cid=wmt_netgear_organic" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1557" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1557" }, { "trust": 0.6, "url": "http://vuldb.com/?id.81131" }, { "trust": 0.1, "url": "https://github.com/firmadyne/firmadyne." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1555" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1558" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "VULHUB", "id": "VHN-90376" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "CNNVD", "id": "CNNVD-201604-393" }, { "db": "NVD", "id": "CVE-2016-1557" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01689" }, { "db": "VULHUB", "id": "VHN-90376" }, { "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "CNNVD", "id": "CNNVD-201604-393" }, { "db": "NVD", "id": "CVE-2016-1557" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01689" }, { "date": "2017-04-21T00:00:00", "db": "VULHUB", "id": "VHN-90376" }, { "date": "2017-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "date": "2016-02-26T17:22:22", "db": "PACKETSTORM", "id": "135956" }, { "date": "2016-03-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-393" }, { "date": "2017-04-21T15:59:00.410000", "db": "NVD", "id": "CVE-2016-1557" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01689" }, { "date": "2017-04-27T00:00:00", "db": "VULHUB", "id": "VHN-90376" }, { "date": "2017-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008489" }, { "date": "2017-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-393" }, { "date": "2024-11-21T02:46:38.070000", "db": "NVD", "id": "CVE-2016-1557" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-393" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Netgear Information disclosure vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008489" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-393" } ], "trust": 0.6 } }
var-201704-0303
Vulnerability from variot
(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands. Netgear is the world's leading enterprise network solution and advocate for digital home networking applications. There are authentication bypass vulnerabilities in Netgear's various devices. Attackers exploit vulnerabilities to directly pass input command lines on unverified web pages and initiate command injection attacks. Security vulnerabilities exist in multiple files in several Netgear products. The following products and versions are affected: Netgear WN604 prior to 3.3.3; WN802Tv2 prior to 3.5.5.0; WNAP210v2 prior to 3.5.5.0; WNAP320 prior to 3.5.5.0; WNDAP350 prior to 3.5.5.0; WNDAP360 prior to 3.5 Versions prior to .5.0; versions prior to WNDAP660 3.5.5.0. Hello,
We’d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at https://github.com/firmadyne/firmadyne. This has been assigned CVE-2016-1555. Affected devices include:
Netgear WN604 Netgear WN802Tv2 Netgear WNAP210 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360
Several D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the 'dlink_uid' cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include:
D-Link DAP-2310 D-Link DAP-2330 D-Link DAP-2360 D-Link DAP-2553 D-Link DAP-2660 D-Link DAP-2690 D-Link DAP-2695
Several Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. Affected devices include:
Netgear WN604 Netgear WNAP210 Netgear WNAP320 Netgear WND930 Netgear WNDAP350 Netgear WNDAP360
Several devices by both D-Link and Netgear disclose wireless passwords and administrative usernames/passwords over SNMP, including OID’s iso.3.6.1.4.1.171.10.37.35.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.38.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.35.4.1.1.1, iso.3.6.1.4.1.171.10.37.37.4.1.1.1, iso.3.6.1.4.1.171.10.37.38.4.1.1.1, iso.3.6.1.4.1.4526.100.7.8.1.5, iso.3.6.1.4.1.4526.100.7.9.1.5, iso.3.6.1.4.1.4526.100.7.9.1.7, and iso.3.6.1.4.1.4526.100.7.10.1.7. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include:
D-Link DAP-1353 D-Link DAP-2553 D-Link DAP-3520 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360
We have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March.
Thanks,
Dominic
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0303", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap660", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap360", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap210v2", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.3.2" }, { "model": "wn802tv2", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.3.3" }, { "model": "wn802tv2", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnap320", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap350", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap360", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap660", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wn604", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn802tv2", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnap210", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnap320", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap350", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.3.2" }, { "model": "wndap210v2", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn802tv2", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "CNNVD", "id": "CNNVD-201604-397" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn802tv2_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap210v2_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008523" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dominic Chen", "sources": [ { "db": "PACKETSTORM", "id": "135956" } ], "trust": 0.1 }, "cve": "CVE-2016-1555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2016-1555", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-01687", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-90374", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-1555", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1555", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-1555", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-01687", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-397", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-90374", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-1555", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "CNNVD", "id": "CNNVD-201604-397" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands. Netgear is the world\u0027s leading enterprise network solution and advocate for digital home networking applications. There are authentication bypass vulnerabilities in Netgear\u0027s various devices. Attackers exploit vulnerabilities to directly pass input command lines on unverified web pages and initiate command injection attacks. Security vulnerabilities exist in multiple files in several Netgear products. The following products and versions are affected: Netgear WN604 prior to 3.3.3; WN802Tv2 prior to 3.5.5.0; WNAP210v2 prior to 3.5.5.0; WNAP320 prior to 3.5.5.0; WNDAP350 prior to 3.5.5.0; WNDAP360 prior to 3.5 Versions prior to .5.0; versions prior to WNDAP660 3.5.5.0. Hello,\n\nWe\u2019d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at https://github.com/firmadyne/firmadyne. This has been assigned CVE-2016-1555. Affected devices include:\n\nNetgear WN604\nNetgear WN802Tv2\nNetgear WNAP210\nNetgear WNAP320\nNetgear WNDAP350\nNetgear WNDAP360\n\nSeveral D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the \u0027dlink_uid\u0027 cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include:\n\nD-Link DAP-2310\nD-Link DAP-2330\nD-Link DAP-2360\nD-Link DAP-2553\nD-Link DAP-2660\nD-Link DAP-2690\nD-Link DAP-2695\n\nSeveral Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. Affected devices include:\n\nNetgear WN604\nNetgear WNAP210\nNetgear WNAP320\nNetgear WND930\nNetgear WNDAP350\nNetgear WNDAP360\n\nSeveral devices by both D-Link and Netgear disclose wireless passwords and administrative usernames/passwords over SNMP, including OID\u2019s iso.3.6.1.4.1.171.10.37.35.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.38.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.35.4.1.1.1, iso.3.6.1.4.1.171.10.37.37.4.1.1.1, iso.3.6.1.4.1.171.10.37.38.4.1.1.1, iso.3.6.1.4.1.4526.100.7.8.1.5, iso.3.6.1.4.1.4526.100.7.9.1.5, iso.3.6.1.4.1.4526.100.7.9.1.7, and iso.3.6.1.4.1.4526.100.7.10.1.7. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include:\n\nD-Link DAP-1353\nD-Link DAP-2553\nD-Link DAP-3520\nNetgear WNAP320\nNetgear WNDAP350\nNetgear WNDAP360\n\nWe have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March. \n\nThanks,\n\nDominic\n", "sources": [ { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "PACKETSTORM", "id": "135956" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-90374", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-90374" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1555", "trust": 3.3 }, { "db": "PACKETSTORM", "id": "135956", "trust": 2.7 }, { "db": "EXPLOIT-DB", "id": "45909", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2016-008523", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-397", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-01687", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "150478", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-90374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-1555", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "CNNVD", "id": "CNNVD-201604-397" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "id": "VAR-201704-0303", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" } ], "trust": 1.2278612025 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" } ] }, "last_update_date": "2024-11-23T21:54:09.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2016-1555 - Notification", "trust": 0.8, "url": "https://kb.netgear.com/30480/CVE-2016-1555-Notification" }, { "title": "Multiple Netgear Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91631" }, { "title": "faisalfs10x", "trust": 0.1, "url": "https://github.com/faisalfs10x/faisalfs10x " } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90374" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://packetstormsecurity.com/files/135956/d-link-netgear-firmadyne-command-injection-buffer-overflow.html" }, { "trust": 2.4, "url": "http://seclists.org/fulldisclosure/2016/feb/112" }, { "trust": 1.8, "url": "https://kb.netgear.com/30480/cve-2016-1555-notification?cid=wmt_netgear_organic" }, { "trust": 1.8, "url": "https://www.exploit-db.com/exploits/45909/" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1555" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1555" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/77.html" }, { "trust": 0.1, "url": "https://github.com/faisalfs10x/faisalfs10x" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/linux/http/netgear_unauth_exec" }, { "trust": 0.1, "url": "https://github.com/firmadyne/firmadyne." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1557" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1558" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "CNNVD", "id": "CNNVD-201604-397" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "CNNVD", "id": "CNNVD-201604-397" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01687" }, { "date": "2017-04-21T00:00:00", "db": "VULHUB", "id": "VHN-90374" }, { "date": "2017-04-21T00:00:00", "db": "VULMON", "id": "CVE-2016-1555" }, { "date": "2017-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "date": "2016-02-26T17:22:22", "db": "PACKETSTORM", "id": "135956" }, { "date": "2016-03-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-397" }, { "date": "2017-04-21T15:59:00.333000", "db": "NVD", "id": "CVE-2016-1555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01687" }, { "date": "2019-04-16T00:00:00", "db": "VULHUB", "id": "VHN-90374" }, { "date": "2019-04-16T00:00:00", "db": "VULMON", "id": "CVE-2016-1555" }, { "date": "2017-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "date": "2019-04-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-397" }, { "date": "2024-11-21T02:46:37.843000", "db": "NVD", "id": "CVE-2016-1555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Netgear Vulnerability to execute arbitrary commands in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008523" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-397" } ], "trust": 0.6 } }
cve-2016-1556
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Feb/112 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.003Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-21T14:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic", "refsource": "CONFIRM", "url": "https://kb.netgear.com/30481/CVE-2016-1556-Notification?cid=wmt_netgear_organic" }, { "name": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-1556", "datePublished": "2017-04-21T15:00:00", "dateReserved": "2016-01-07T00:00:00", "dateUpdated": "2024-08-05T23:02:12.003Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18863
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:44.348Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-28T15:56:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18863", "datePublished": "2020-04-28T15:56:07", "dateReserved": "2020-04-27T00:00:00", "dateUpdated": "2024-08-05T21:37:44.348Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18805
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:43.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-21T17:42:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18805", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18805", "datePublished": "2020-04-21T17:42:08", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T21:37:43.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21094
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:L/C:L/I:L/PR:N/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-27T14:42:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:L/C:L/I:L/PR:N/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21094", "datePublished": "2020-04-27T14:42:14", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1555
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/45909/ | exploit, x_refsource_EXPLOIT-DB | |
http://seclists.org/fulldisclosure/2016/Feb/112 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "45909", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45909/" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2016-1555", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:10:18.350058Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2016-1555" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T13:17:23.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-24T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-01T10:57:01.000Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "45909", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45909/" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic", "refsource": "CONFIRM", "url": "https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic" }, { "name": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "45909", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45909/" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-1555", "datePublished": "2017-04-21T15:00:00.000Z", "dateReserved": "2016-01-07T00:00:00.000Z", "dateUpdated": "2025-02-07T13:17:23.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21096
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-27T15:56:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21096", "datePublished": "2020-04-27T15:56:14", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1557
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html | x_refsource_MISC | |
https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2016/Feb/112 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:11.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-21T14:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html" }, { "name": "https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic", "refsource": "CONFIRM", "url": "https://kb.netgear.com/30482/CVE-2016-1557-Notification?cid=wmt_netgear_organic" }, { "name": "20160225 D-Link, Netgear Router Vulnerabiltiies", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Feb/112" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-1557", "datePublished": "2017-04-21T15:00:00", "dateReserved": "2016-01-07T00:00:00", "dateUpdated": "2024-08-05T23:02:11.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:H/PR:N/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-27T15:57:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:H/PR:N/S:U/UI:R", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21097", "datePublished": "2020-04-27T15:57:34", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18806
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:44.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-21T15:56:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18806", "datePublished": "2020-04-21T15:56:41", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T21:37:44.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21120
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-22T15:12:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21120", "datePublished": "2020-04-22T15:12:18", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }