Vulnerabilites related to zyxel - nbg-418n
var-201512-0086
Vulnerability from variot
ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL PMG5318-B20A There is a vulnerability in the device firmware that can gain administrator privileges. The ZyXEL PMG5318-B20A is a wireless switch from ZyXEL Technology. A remote attacker could exploit this vulnerability to modify the system configuration. Multiple ZyXEL Routers are prone to following security vulnerabilities: 1. An insecure default-password vulnerability 2. Multiple cross-site scripting vulnerabilities 3. A command-execution vulnerability 4. A security-bypass vulnerability 5. An authorization-bypass Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0086", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pmg5318-b20a", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "v100aanc0b5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00aanc0b5" }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a v100aanc0b5", "scope": null, "trust": 0.3, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 3.40", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "model": "pmg5318-b20a 1.00 c0", "scope": "ne", "trust": 0.3, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "NVD", "id": "CVE-2015-6020" }, { "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:v100aanc0b5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6020" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land and Karn Ganeshen", "sources": [ { "db": "BID", "id": "77077" } ], "trust": 0.3 }, "cve": "CVE-2015-6020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 8.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-6020", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-06873", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-83981", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6020", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-06873", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201510-345", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-83981", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "VULHUB", "id": "VHN-83981" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "NVD", "id": "CVE-2015-6020" }, { "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL PMG5318-B20A There is a vulnerability in the device firmware that can gain administrator privileges. The ZyXEL PMG5318-B20A is a wireless switch from ZyXEL Technology. A remote attacker could exploit this vulnerability to modify the system configuration. Multiple ZyXEL Routers are prone to following security vulnerabilities:\n1. An insecure default-password vulnerability\n2. Multiple cross-site scripting vulnerabilities\n3. A command-execution vulnerability\n4. A security-bypass vulnerability\n5. An authorization-bypass\nSuccessful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2015-6020" }, { "db": "CERT/CC", "id": "VU#870744" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "BID", "id": "77077" }, { "db": "VULHUB", "id": "VHN-83981" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#870744", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-6020", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034553", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97093739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006597", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-345", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-06873", "trust": 0.6 }, { "db": "BID", "id": "77077", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-83981", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "VULHUB", "id": "VHN-83981" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "NVD", "id": "CVE-2015-6020" }, { "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "id": "VAR-201512-0086", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "VULHUB", "id": "VHN-83981" } ], "trust": 1.2930356 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06873" } ] }, "last_update_date": "2023-12-18T12:20:44.392000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PMG5318-B20A", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=m-01700\u0026md=pmg5318-b20a" }, { "title": "ZyXEL Support Center - Latest Release", "trust": 0.8, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "title": "ZyXEL PMG5318-B20A patch for incorrect authorization vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/65624" }, { "title": "ZyXEL PMG5318-B20A Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58193" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83981" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "NVD", "id": "CVE-2015-6020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/870744" }, { "trust": 1.9, "url": "https://www.kb.cert.org/vuls/id/bluu-9zqu2r" }, { "trust": 1.5, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034553" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6020" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97093739/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6020" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "VULHUB", "id": "VHN-83981" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "NVD", "id": "CVE-2015-6020" }, { "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06873" }, { "db": "VULHUB", "id": "VHN-83981" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "db": "NVD", "id": "CVE-2015-6020" }, { "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-13T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-27T00:00:00", "db": "CNVD", "id": "CNVD-2015-06873" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-83981" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "date": "2015-12-31T05:59:18.617000", "db": "NVD", "id": "CVE-2015-6020" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-29T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06873" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-83981" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006597" }, { "date": "2016-12-07T18:17:43.327000", "db": "NVD", "id": "CVE-2015-6020" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-345" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-345" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 routers contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#870744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-345" } ], "trust": 0.6 } }
var-201512-0083
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in Forms/rpAuth_1 on ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0) allow remote attackers to inject arbitrary web script or HTML via the (1) LoginPassword or (2) hiddenPassword parameter. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL P-660HW-T1 v2 Device firmware ZyNOS of Forms/rpAuth_1 Contains a cross-site scripting vulnerability. In addition, JVNVU#97093739 Then CWE-80 It is published as CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) http://cwe.mitre.org/data/definitions/80.htmlBy a third party (1) LoginPassword Or (2) hiddenPassword Any via parameter Web Script or HTML May be inserted. The Zyxel P-660HW-T1 is a wireless router product from ZyXEL Technology. Multiple ZyXEL Routers are prone to following security vulnerabilities: 1. An insecure default-password vulnerability 2. A command-execution vulnerability 4. A security-bypass vulnerability 5. An authorization-bypass Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0083", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "p-660hw-t1 v2", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "3.40\\(axh.0\\)" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 v2", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "zynos", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "3.40 (axh.0) (2007 year 3 moon 30 day )" }, { "model": "p-660hw-t1", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a v100aanc0b5", "scope": null, "trust": 0.3, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 3.40", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "model": "pmg5318-b20a 1.00 c0", "scope": "ne", "trust": 0.3, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "NVD", "id": "CVE-2015-6017" }, { "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:p-660hw-t1_v2_firmware:3.40\\(axh.0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6017" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land and Karn Ganeshen", "sources": [ { "db": "BID", "id": "77077" } ], "trust": 0.3 }, "cve": "CVE-2015-6017", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6017", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-06885", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-83978", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6017", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-06885", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201510-348", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-83978", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "VULHUB", "id": "VHN-83978" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "NVD", "id": "CVE-2015-6017" }, { "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in Forms/rpAuth_1 on ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0) allow remote attackers to inject arbitrary web script or HTML via the (1) LoginPassword or (2) hiddenPassword parameter. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL P-660HW-T1 v2 Device firmware ZyNOS of Forms/rpAuth_1 Contains a cross-site scripting vulnerability. In addition, JVNVU#97093739 Then CWE-80 It is published as CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) http://cwe.mitre.org/data/definitions/80.htmlBy a third party (1) LoginPassword Or (2) hiddenPassword Any via parameter Web Script or HTML May be inserted. The Zyxel P-660HW-T1 is a wireless router product from ZyXEL Technology. Multiple ZyXEL Routers are prone to following security vulnerabilities:\n1. An insecure default-password vulnerability\n2. A command-execution vulnerability\n4. A security-bypass vulnerability\n5. An authorization-bypass\nSuccessful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2015-6017" }, { "db": "CERT/CC", "id": "VU#870744" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "BID", "id": "77077" }, { "db": "VULHUB", "id": "VHN-83978" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#870744", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-6017", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034552", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97093739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006594", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-348", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-06885", "trust": 0.6 }, { "db": "BID", "id": "77077", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-83978", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "VULHUB", "id": "VHN-83978" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "NVD", "id": "CVE-2015-6017" }, { "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "id": "VAR-201512-0083", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "VULHUB", "id": "VHN-83978" } ], "trust": 1.3363635999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06885" } ] }, "last_update_date": "2023-12-18T12:20:44.468000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "P-660HW-T1 v2", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=md06084\u0026md=p-660hw-t1%20v2" }, { "title": "ZyXEL Support Center - Latest Release", "trust": 0.8, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "title": "Patch for ZyXEL P-660HW-T1 Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/65621" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83978" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "NVD", "id": "CVE-2015-6017" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/870744" }, { "trust": 1.9, "url": "https://www.kb.cert.org/vuls/id/bluu-9zqu2r" }, { "trust": 1.5, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034552" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6017" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97093739/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6017" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "VULHUB", "id": "VHN-83978" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "NVD", "id": "CVE-2015-6017" }, { "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "VULHUB", "id": "VHN-83978" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "db": "NVD", "id": "CVE-2015-6017" }, { "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-13T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-27T00:00:00", "db": "CNVD", "id": "CNVD-2015-06885" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-83978" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "date": "2015-12-31T05:59:15.880000", "db": "NVD", "id": "CVE-2015-6017" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-29T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06885" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-83978" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006594" }, { "date": "2016-12-07T18:17:40.077000", "db": "NVD", "id": "CVE-2015-6017" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-348" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-348" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL P-660HW-T1 Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2015-06885" }, { "db": "CNNVD", "id": "CNNVD-201510-348" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-348" } ], "trust": 0.6 } }
var-201512-0082
Vulnerability from variot
ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 are products of ZyXEL Technology. Both NBG-418N and P-660HW-T1 are wireless broadband routers; PMG5318-B20A is a wireless switch product. There are security vulnerabilities in several ZyXEL routers. A remote attacker could exploit this vulnerability to modify the system configuration. An insecure default-password vulnerability 2. Multiple cross-site scripting vulnerabilities 3. A command-execution vulnerability 4. A security-bypass vulnerability 5. An authorization-bypass Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions. There is a security vulnerability in ZyXEL P-660HW-T1 2 devices using ZyNOS 3.40(AXH.0) firmware, PMG5318-B20A devices and NBG-418N devices using 1.00AANC0b5 firmware. The vulnerability is caused by using '1234' as admin account password
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0082", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pmg5318-b20a", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "v100aanc0b5" }, { "model": "nbg-418n", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": null }, { "model": "nbg-418n", "scope": null, "trust": 1.4, "vendor": "zyxel", "version": null }, { "model": "zynos", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": "3.40\\(axh.0\\)" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 v2", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00aanc0b5" }, { "model": "zynos", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "3.40(axh.0) (2007 year 3 moon 30 day ) (p660hw-t1 v2)" }, { "model": "p-660hw-t1", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 2", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a v100aanc0b5", "scope": null, "trust": 0.3, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 3.40", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "model": "pmg5318-b20a 1.00 c0", "scope": "ne", "trust": 0.3, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nbg-418n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:p-660hw-t1_2:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:zynos_firmware:3.40\\(axh.0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:v100aanc0b5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6016" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land and Karn Ganeshen", "sources": [ { "db": "BID", "id": "77077" } ], "trust": 0.3 }, "cve": "CVE-2015-6016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-6016", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2015-06900", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83977", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6016", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2015-6016", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-06900", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201510-349", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-83977", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 are products of ZyXEL Technology. Both NBG-418N and P-660HW-T1 are wireless broadband routers; PMG5318-B20A is a wireless switch product. There are security vulnerabilities in several ZyXEL routers. A remote attacker could exploit this vulnerability to modify the system configuration. An insecure default-password vulnerability\n2. Multiple cross-site scripting vulnerabilities\n3. A command-execution vulnerability\n4. A security-bypass vulnerability\n5. An authorization-bypass\nSuccessful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions. There is a security vulnerability in ZyXEL P-660HW-T1 2 devices using ZyNOS 3.40(AXH.0) firmware, PMG5318-B20A devices and NBG-418N devices using 1.00AANC0b5 firmware. The vulnerability is caused by using \u00271234\u0027 as admin account password", "sources": [ { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CERT/CC", "id": "VU#870744" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "BID", "id": "77077" }, { "db": "VULHUB", "id": "VHN-83977" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#870744", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-6016", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034553", "trust": 1.1 }, { "db": "SECTRACK", "id": "1034552", "trust": 1.1 }, { "db": "SECTRACK", "id": "1034554", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97093739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006593", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-349", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-06900", "trust": 0.6 }, { "db": "BID", "id": "77077", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-83977", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "id": "VAR-201512-0082", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" } ], "trust": 1.2930356 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" } ] }, "last_update_date": "2023-12-18T12:20:44.543000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NBG-418N", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=m-01393\u0026md=nbg-418n" }, { "title": "PMG5318-B20A", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=m-01700\u0026md=pmg5318-b20a" }, { "title": "P-660HW-T1 v2", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=md06084\u0026md=p-660hw-t1%20v2" }, { "title": "ZyXEL Support Center - Latest Release", "trust": 0.8, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "title": "DefaultPassword", "trust": 0.8, "url": "https://default-password.info/zyxel/" }, { "title": "Patches for multiple ZyXEL router credential management vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/65620" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83977" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/870744" }, { "trust": 1.9, "url": "https://www.kb.cert.org/vuls/id/bluu-9zqu2r" }, { "trust": 1.5, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034552" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034553" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034554" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6016" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97093739/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6016" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06900" }, { "db": "VULHUB", "id": "VHN-83977" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "db": "NVD", "id": "CVE-2015-6016" }, { "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-13T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06900" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-83977" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "date": "2015-12-31T05:59:14.833000", "db": "NVD", "id": "CVE-2015-6016" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-29T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06900" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-83977" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006593" }, { "date": "2016-12-07T18:17:39.030000", "db": "NVD", "id": "CVE-2015-6016" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-349" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-349" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 routers contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#870744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-349" } ], "trust": 0.6 } }
var-201512-0094
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users. ZyXELNBG-418N is a wireless broadband router from ZyXEL Technology. An attacker can exploit these issues to gain unauthorized access, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. A remote attacker could exploit this vulnerability to perform unauthorized operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0094", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nbg-418n", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "1.00\\(aadz.3\\)c0" }, { "model": "nbg-418n", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": "*" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nbg-418n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nbg-418n", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00(aadz.3)c0" }, { "model": "nbg-418n devices with 1.00 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "NVD", "id": "CVE-2015-7284" }, { "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\\(aadz.3\\)c0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nbg-418n:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7284" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land of the CERT/CC", "sources": [ { "db": "BID", "id": "78819" }, { "db": "CNNVD", "id": "CNNVD-201512-315" } ], "trust": 0.9 }, "cve": "CVE-2015-7284", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-7284", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2016-00151", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-85245", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7284", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-7284", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2016-00151", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201512-315", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-85245", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "VULHUB", "id": "VHN-85245" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "NVD", "id": "CVE-2015-7284" }, { "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users. ZyXELNBG-418N is a wireless broadband router from ZyXEL Technology. \nAn attacker can exploit these issues to gain unauthorized access, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker\u0027s behalf using a victim\u0027s currently active session. A remote attacker could exploit this vulnerability to perform unauthorized operations", "sources": [ { "db": "NVD", "id": "CVE-2015-7284" }, { "db": "CERT/CC", "id": "VU#330000" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "BID", "id": "78819" }, { "db": "VULHUB", "id": "VHN-85245" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#330000", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-7284", "trust": 3.4 }, { "db": "BID", "id": "78819", "trust": 2.0 }, { "db": "SECTRACK", "id": "1034554", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU90501820", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006555", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201512-315", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-00151", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-85245", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "VULHUB", "id": "VHN-85245" }, { "db": "BID", "id": "78819" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "NVD", "id": "CVE-2015-7284" }, { "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "id": "VAR-201512-0094", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "VULHUB", "id": "VHN-85245" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00151" } ] }, "last_update_date": "2023-12-18T12:20:44.505000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Download Library", "trust": 0.8, "url": "http://www.zyxel.com/us/en/support/download_library/product/nbg_418n_7.shtml?c=us\u0026l=en\u0026pid=20120320173444\u0026tab=firmware" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85245" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "NVD", "id": "CVE-2015-7284" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/330000" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/78819" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034554" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7284" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu90501820/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7284" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "VULHUB", "id": "VHN-85245" }, { "db": "BID", "id": "78819" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "NVD", "id": "CVE-2015-7284" }, { "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00151" }, { "db": "VULHUB", "id": "VHN-85245" }, { "db": "BID", "id": "78819" }, { "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "db": "NVD", "id": "CVE-2015-7284" }, { "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-10T00:00:00", "db": "CERT/CC", "id": "VU#330000" }, { "date": "2016-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2016-00151" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-85245" }, { "date": "2015-12-10T00:00:00", "db": "BID", "id": "78819" }, { "date": "2016-01-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "date": "2015-12-31T05:59:26.217000", "db": "NVD", "id": "CVE-2015-7284" }, { "date": "2015-12-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-10T00:00:00", "db": "CERT/CC", "id": "VU#330000" }, { "date": "2016-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2016-00151" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-85245" }, { "date": "2015-12-10T00:00:00", "db": "BID", "id": "78819" }, { "date": "2016-01-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006555" }, { "date": "2016-12-07T18:23:49.977000", "db": "NVD", "id": "CVE-2015-7284" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-315" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-315" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N router uses default credentials and is vulnerable to cross-site request forgery", "sources": [ { "db": "CERT/CC", "id": "VU#330000" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-315" } ], "trust": 0.6 } }
var-201512-0093
Vulnerability from variot
The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. ZyXEL NBG-418N router, firmware version 1.00(AADZ.3)C0, uses default credentials and is vulnerable to cross-site request forgery. ZyXELNBG-418N is a wireless broadband router from ZyXEL Technology. ZyXELNBG-418Ndeviceswithfirmware1.00(AADZ.3)C0 has a credential management vulnerability. An attacker can exploit these issues to gain unauthorized access, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. The vulnerability is caused by using '1234' as the password for the admin account
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0093", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nbg-418n", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "1.00\\(aadz.3\\)c0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nbg-418n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nbg-418n", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00(aadz.3)c0" }, { "model": "nbg-418n devices with 1.00 c0", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "NVD", "id": "CVE-2015-7283" }, { "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\\(aadz.3\\)c0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nbg-418n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7283" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land of the CERT/CC", "sources": [ { "db": "BID", "id": "78819" }, { "db": "CNNVD", "id": "CNNVD-201512-314" } ], "trust": 0.9 }, "cve": "CVE-2015-7283", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-7283", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2016-00152", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-85244", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7283", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-00152", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201512-314", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-85244", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "VULHUB", "id": "VHN-85244" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "NVD", "id": "CVE-2015-7283" }, { "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. ZyXEL NBG-418N router, firmware version 1.00(AADZ.3)C0, uses default credentials and is vulnerable to cross-site request forgery. ZyXELNBG-418N is a wireless broadband router from ZyXEL Technology. ZyXELNBG-418Ndeviceswithfirmware1.00(AADZ.3)C0 has a credential management vulnerability. \nAn attacker can exploit these issues to gain unauthorized access, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker\u0027s behalf using a victim\u0027s currently active session. The vulnerability is caused by using \u00271234\u0027 as the password for the admin account", "sources": [ { "db": "NVD", "id": "CVE-2015-7283" }, { "db": "CERT/CC", "id": "VU#330000" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "BID", "id": "78819" }, { "db": "VULHUB", "id": "VHN-85244" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#330000", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-7283", "trust": 3.4 }, { "db": "BID", "id": "78819", "trust": 2.0 }, { "db": "SECTRACK", "id": "1034554", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU90501820", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201512-314", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-00152", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-85244", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "VULHUB", "id": "VHN-85244" }, { "db": "BID", "id": "78819" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "NVD", "id": "CVE-2015-7283" }, { "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "id": "VAR-201512-0093", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "VULHUB", "id": "VHN-85244" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00152" } ] }, "last_update_date": "2023-12-18T12:20:44.428000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Download Library", "trust": 0.8, "url": "http://www.zyxel.com/us/en/support/download_library/product/nbg_418n_7.shtml?c=us\u0026l=en\u0026pid=20120320173444\u0026tab=firmware" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85244" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "NVD", "id": "CVE-2015-7283" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/330000" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/78819" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034554" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7283" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu90501820/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7283" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "VULHUB", "id": "VHN-85244" }, { "db": "BID", "id": "78819" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "NVD", "id": "CVE-2015-7283" }, { "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#330000" }, { "db": "CNVD", "id": "CNVD-2016-00152" }, { "db": "VULHUB", "id": "VHN-85244" }, { "db": "BID", "id": "78819" }, { "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "db": "NVD", "id": "CVE-2015-7283" }, { "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-10T00:00:00", "db": "CERT/CC", "id": "VU#330000" }, { "date": "2016-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2016-00152" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-85244" }, { "date": "2015-12-10T00:00:00", "db": "BID", "id": "78819" }, { "date": "2016-01-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "date": "2015-12-31T05:59:25.260000", "db": "NVD", "id": "CVE-2015-7283" }, { "date": "2015-12-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-10T00:00:00", "db": "CERT/CC", "id": "VU#330000" }, { "date": "2016-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2016-00152" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-85244" }, { "date": "2015-12-10T00:00:00", "db": "BID", "id": "78819" }, { "date": "2016-01-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006554" }, { "date": "2016-12-07T18:23:48.803000", "db": "NVD", "id": "CVE-2015-7283" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N router uses default credentials and is vulnerable to cross-site request forgery", "sources": [ { "db": "CERT/CC", "id": "VU#330000" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-314" } ], "trust": 0.6 } }
var-201512-0085
Vulnerability from variot
The management portal on ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 does not terminate sessions upon a logout action, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. In addition, National Vulnerability Database (NVD) Then CWE-330 , JVNVU#97093739 Then CWE-613 It is published as CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.html CWE-613: Insufficient Session Expiration http://cwe.mitre.org/data/definitions/613.htmlAccess restrictions may be avoided by using an unattended workstation by a third party. The ZyXEL PMG5318-B20A is a wireless switch from ZyXEL Technology. A security vulnerability exists in the ZyXEL PMG5318-B20A with firmware version V100AANC0b5. A remote attacker can use the vulnerability information to gain access to the device. Multiple ZyXEL Routers are prone to following security vulnerabilities: 1. An insecure default-password vulnerability 2. Multiple cross-site scripting vulnerabilities 3. A command-execution vulnerability 4. A security-bypass vulnerability 5. An authorization-bypass Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0085", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pmg5318-b20a", "scope": "eq", "trust": 1.6, "vendor": "zyxel", "version": "v100aanc0b5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00aanc0b5" }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a v100aanc0b5", "scope": null, "trust": 0.3, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 3.40", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "model": "pmg5318-b20a 1.00 c0", "scope": "ne", "trust": 0.3, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "NVD", "id": "CVE-2015-6019" }, { "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:v100aanc0b5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6019" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land and Karn Ganeshen", "sources": [ { "db": "BID", "id": "77077" } ], "trust": 0.3 }, "cve": "CVE-2015-6019", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6019", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2015-06874", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-83980", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.1, "impactScore": 4.7, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6019", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-6019", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2015-06874", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201510-346", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-83980", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "VULHUB", "id": "VHN-83980" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "NVD", "id": "CVE-2015-6019" }, { "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The management portal on ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 does not terminate sessions upon a logout action, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. In addition, National Vulnerability Database (NVD) Then CWE-330 , JVNVU#97093739 Then CWE-613 It is published as CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.html CWE-613: Insufficient Session Expiration http://cwe.mitre.org/data/definitions/613.htmlAccess restrictions may be avoided by using an unattended workstation by a third party. The ZyXEL PMG5318-B20A is a wireless switch from ZyXEL Technology. A security vulnerability exists in the ZyXEL PMG5318-B20A with firmware version V100AANC0b5. A remote attacker can use the vulnerability information to gain access to the device. Multiple ZyXEL Routers are prone to following security vulnerabilities:\n1. An insecure default-password vulnerability\n2. Multiple cross-site scripting vulnerabilities\n3. A command-execution vulnerability\n4. A security-bypass vulnerability\n5. An authorization-bypass\nSuccessful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2015-6019" }, { "db": "CERT/CC", "id": "VU#870744" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "BID", "id": "77077" }, { "db": "VULHUB", "id": "VHN-83980" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#870744", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-6019", "trust": 3.4 }, { "db": "SECTRACK", "id": "1034553", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97093739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006596", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-346", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-06874", "trust": 0.6 }, { "db": "BID", "id": "77077", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-83980", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "VULHUB", "id": "VHN-83980" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "NVD", "id": "CVE-2015-6019" }, { "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "id": "VAR-201512-0085", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "VULHUB", "id": "VHN-83980" } ], "trust": 1.2930356 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06874" } ] }, "last_update_date": "2023-12-18T12:20:44.580000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PMG5318-B20A", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=m-01700\u0026md=pmg5318-b20a" }, { "title": "ZyXEL Support Center - Latest Release", "trust": 0.8, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "title": "ZyXEL PMG5318-B20A Session Expiration Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/65623" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "NVD", "id": "CVE-2015-6019" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.kb.cert.org/vuls/id/870744" }, { "trust": 1.9, "url": "https://www.kb.cert.org/vuls/id/bluu-9zqu2r" }, { "trust": 1.5, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034553" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6019" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97093739/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6019" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "VULHUB", "id": "VHN-83980" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "NVD", "id": "CVE-2015-6019" }, { "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06874" }, { "db": "VULHUB", "id": "VHN-83980" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "db": "NVD", "id": "CVE-2015-6019" }, { "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-13T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-27T00:00:00", "db": "CNVD", "id": "CNVD-2015-06874" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-83980" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "date": "2015-12-31T05:59:17.727000", "db": "NVD", "id": "CVE-2015-6019" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-29T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06874" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-83980" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006596" }, { "date": "2016-12-07T18:17:42.343000", "db": "NVD", "id": "CVE-2015-6019" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-346" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-346" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 routers contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#870744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-346" } ], "trust": 0.6 } }
var-201512-0084
Vulnerability from variot
The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. The ZyXEL PMG5318-B20A is a wireless switch from ZyXEL Technology. A security hole exists in the 'PingIPAddr' parameter in the diagnostic ping function of the ZyXEL PMG5318-B20A using V100AANC0b5 firmware. Multiple ZyXEL Routers are prone to following security vulnerabilities: 1. An insecure default-password vulnerability 2. Multiple cross-site scripting vulnerabilities 3. A command-execution vulnerability 4. A security-bypass vulnerability 5. An authorization-bypass Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0084", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pmg5318-b20a", "scope": "lte", "trust": 1.0, "vendor": "zyxel", "version": "v100aanc0b5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "lt", "trust": 0.8, "vendor": "zyxel", "version": "1.00(aanc.2)c0" }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.6, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "v100aanc0b5" }, { "model": "pmg5318-b20a v100aanc0b5", "scope": null, "trust": 0.3, "vendor": "zyxel", "version": null }, { "model": "p-660hw-t1 3.40", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "v2" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.3, "vendor": "zyxel", "version": "0" }, { "model": "pmg5318-b20a 1.00 c0", "scope": "ne", "trust": 0.3, "vendor": "zyxel", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "NVD", "id": "CVE-2015-6018" }, { "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100aanc0b5", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6018" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joel Land and Karn Ganeshen", "sources": [ { "db": "BID", "id": "77077" } ], "trust": 0.3 }, "cve": "CVE-2015-6018", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-6018", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-06884", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83979", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6018", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2015-6018", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-06884", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201510-347", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-83979", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-6018", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "VULHUB", "id": "VHN-83979" }, { "db": "VULMON", "id": "CVE-2015-6018" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "NVD", "id": "CVE-2015-6018" }, { "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter. Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting. The ZyXEL PMG5318-B20A is a wireless switch from ZyXEL Technology. A security hole exists in the \u0027PingIPAddr\u0027 parameter in the diagnostic ping function of the ZyXEL PMG5318-B20A using V100AANC0b5 firmware. Multiple ZyXEL Routers are prone to following security vulnerabilities:\n1. An insecure default-password vulnerability\n2. Multiple cross-site scripting vulnerabilities\n3. A command-execution vulnerability\n4. A security-bypass vulnerability\n5. An authorization-bypass\nSuccessful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, execute arbitrary commands, to gain unauthorized access and bypass security restrictions and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2015-6018" }, { "db": "CERT/CC", "id": "VU#870744" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "BID", "id": "77077" }, { "db": "VULHUB", "id": "VHN-83979" }, { "db": "VULMON", "id": "CVE-2015-6018" } ], "trust": 3.33 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-83979", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=38455", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-83979" }, { "db": "VULMON", "id": "CVE-2015-6018" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#870744", "trust": 4.3 }, { "db": "NVD", "id": "CVE-2015-6018", "trust": 3.5 }, { "db": "SECTRACK", "id": "1034553", "trust": 1.2 }, { "db": "EXPLOIT-DB", "id": "38455", "trust": 1.2 }, { "db": "JVN", "id": "JVNVU97093739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006595", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-347", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-06884", "trust": 0.6 }, { "db": "BID", "id": "77077", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "133960", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-83979", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-6018", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "VULHUB", "id": "VHN-83979" }, { "db": "VULMON", "id": "CVE-2015-6018" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "NVD", "id": "CVE-2015-6018" }, { "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "id": "VAR-201512-0084", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "VULHUB", "id": "VHN-83979" } ], "trust": 1.2930356 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06884" } ] }, "last_update_date": "2023-12-18T12:20:44.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PMG5318-B20A", "trust": 0.8, "url": "http://www.zyxel.com/support/supportlandingsr.shtml?c=gb\u0026l=en\u0026kbid=m-01700\u0026md=pmg5318-b20a" }, { "title": "ZyXEL Support Center - Latest Release", "trust": 0.8, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "title": "ZyXEL PMG5318-B20A diagnostic ping function input verification vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/65622" }, { "title": "ZyXEL PMG5318-B20A diagnostic ping Fixes for feature permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58195" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83979" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "NVD", "id": "CVE-2015-6018" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "https://www.kb.cert.org/vuls/id/870744" }, { "trust": 2.0, "url": "https://www.kb.cert.org/vuls/id/bluu-9zqu2r" }, { "trust": 1.5, "url": "http://www.zyxel.com/support/support_landing.shtml" }, { "trust": 1.3, "url": "https://www.exploit-db.com/exploits/38455/" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1034553" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6018" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97093739/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6018" }, { "trust": 0.3, "url": "http://www.zyxel.com/th/th/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "VULHUB", "id": "VHN-83979" }, { "db": "VULMON", "id": "CVE-2015-6018" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "NVD", "id": "CVE-2015-6018" }, { "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#870744" }, { "db": "CNVD", "id": "CNVD-2015-06884" }, { "db": "VULHUB", "id": "VHN-83979" }, { "db": "VULMON", "id": "CVE-2015-6018" }, { "db": "BID", "id": "77077" }, { "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "db": "NVD", "id": "CVE-2015-6018" }, { "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-13T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-27T00:00:00", "db": "CNVD", "id": "CNVD-2015-06884" }, { "date": "2015-12-31T00:00:00", "db": "VULHUB", "id": "VHN-83979" }, { "date": "2015-12-31T00:00:00", "db": "VULMON", "id": "CVE-2015-6018" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "date": "2015-12-31T05:59:16.770000", "db": "NVD", "id": "CVE-2015-6018" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-29T00:00:00", "db": "CERT/CC", "id": "VU#870744" }, { "date": "2015-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2015-06884" }, { "date": "2017-09-15T00:00:00", "db": "VULHUB", "id": "VHN-83979" }, { "date": "2017-09-15T00:00:00", "db": "VULMON", "id": "CVE-2015-6018" }, { "date": "2015-10-13T00:00:00", "db": "BID", "id": "77077" }, { "date": "2016-01-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006595" }, { "date": "2017-09-15T01:29:00.577000", "db": "NVD", "id": "CVE-2015-6018" }, { "date": "2016-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-347" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-347" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 routers contain multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#870744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-347" } ], "trust": 0.6 } }
var-201903-0022
Vulnerability from variot
Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF. Zyxel NBG-418N v2 The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZyxelNBG-418Nv2Modem is a wireless router from ZyXEL Technology. A cross-site request forgery vulnerability exists in the ZyxelNBG-418Nv2Modem1.00 (AAXM.6) C0 release that could be exploited by a remote attacker to perform unauthorized operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201903-0022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nbg-418n", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": "1.00\\(aaxm.6\\)c0" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00(aaxm.4)c0" }, { "model": "nbg-418n modem 1.00 c0", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "v2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" }, { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "NVD", "id": "CVE-2019-6710" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\\(aaxm.6\\)c0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-6710" } ] }, "cve": "CVE-2019-6710", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-6710", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2019-03785", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6710", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-6710", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-03785", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201901-896", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" }, { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "NVD", "id": "CVE-2019-6710" }, { "db": "CNNVD", "id": "CNNVD-201901-896" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF. Zyxel NBG-418N v2 The device contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZyxelNBG-418Nv2Modem is a wireless router from ZyXEL Technology. A cross-site request forgery vulnerability exists in the ZyxelNBG-418Nv2Modem1.00 (AAXM.6) C0 release that could be exploited by a remote attacker to perform unauthorized operations", "sources": [ { "db": "NVD", "id": "CVE-2019-6710" }, { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "CNVD", "id": "CNVD-2019-03785" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6710", "trust": 3.0 }, { "db": "EXPLOIT-DB", "id": "46240", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-002254", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-03785", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201901-896", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" }, { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "NVD", "id": "CVE-2019-6710" }, { "db": "CNNVD", "id": "CNNVD-201901-896" } ] }, "id": "VAR-201903-0022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" } ] }, "last_update_date": "2023-12-18T12:00:32.258000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NBG-418N v2", "trust": 0.8, "url": "https://www.zyxel.com/us/en/support/downloadlandingsr.shtml?c=us\u0026l=en\u0026kbid=m-02059\u0026md=nbg-418n%20v2#searchzyxeltab1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002254" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "NVD", "id": "CVE-2019-6710" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://alicangonullu.biz/konu/3" }, { "trust": 1.6, "url": "https://twitter.com/god3err/status/1088067902832631809" }, { "trust": 1.6, "url": "https://www.exploit-db.com/exploits/46240/" }, { "trust": 1.4, "url": "https://www.exploit-db.com/exploits/46240" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6710" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6710" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" }, { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "NVD", "id": "CVE-2019-6710" }, { "db": "CNNVD", "id": "CNNVD-201901-896" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-03785" }, { "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "db": "NVD", "id": "CVE-2019-6710" }, { "db": "CNNVD", "id": "CNNVD-201901-896" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-12T00:00:00", "db": "CNVD", "id": "CNVD-2019-03785" }, { "date": "2019-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "date": "2019-03-07T23:29:01.547000", "db": "NVD", "id": "CVE-2019-6710" }, { "date": "2019-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-896" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-12T00:00:00", "db": "CNVD", "id": "CNVD-2019-03785" }, { "date": "2019-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002254" }, { "date": "2019-03-08T20:16:12.850000", "db": "NVD", "id": "CVE-2019-6710" }, { "date": "2019-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-896" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-896" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel NBG-418N v2 Modem Cross-Site Request Forgery Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-03785" }, { "db": "CNNVD", "id": "CNNVD-201901-896" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-896" } ], "trust": 0.6 } }
var-201910-1281
Vulnerability from variot
wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page. Zyxel NBG-418N v2 Authentication firmware contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZyXEL NBG-418N v2 is a wireless router from China ZyXEL (ZyXEL) company.
The wan.htm page in Zyxel NBG-418N v2 using V1.00 (AARP.9) C0 firmware has an authorization issue vulnerability. The vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. There is currently no detailed vulnerability details provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201910-1281", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nbg-418n v2", "scope": "eq", "trust": 1.0, "vendor": "zyxel", "version": "1.00\\(aarp.9\\)c0" }, { "model": "nbg-418n", "scope": "eq", "trust": 0.8, "vendor": "zyxel", "version": "1.00(aarp.9)c0" }, { "model": "nbg-418n v1.00 c0", "scope": "eq", "trust": 0.6, "vendor": "zyxel", "version": "v2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28446" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "NVD", "id": "CVE-2019-17354" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:zyxel:nbg-418n_v2_firmware:1.00\\(aarp.9\\)c0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:zyxel:nbg-418n_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-17354" } ] }, "cve": "CVE-2019-17354", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-17354", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-28446", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-149592", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 5.5, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.4, "baseSeverity": "Critical", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-17354", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-17354", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-28446", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201910-506", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-149592", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28446" }, { "db": "VULHUB", "id": "VHN-149592" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "NVD", "id": "CVE-2019-17354" }, { "db": "CNNVD", "id": "CNNVD-201910-506" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page. Zyxel NBG-418N v2 Authentication firmware contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZyXEL NBG-418N v2 is a wireless router from China ZyXEL (ZyXEL) company. \n\r\n\r\nThe wan.htm page in Zyxel NBG-418N v2 using V1.00 (AARP.9) C0 firmware has an authorization issue vulnerability. The vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. There is currently no detailed vulnerability details provided", "sources": [ { "db": "NVD", "id": "CVE-2019-17354" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "CNVD", "id": "CNVD-2020-28446" }, { "db": "VULHUB", "id": "VHN-149592" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-17354", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-010637", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-28446", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201910-506", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-149592", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28446" }, { "db": "VULHUB", "id": "VHN-149592" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "NVD", "id": "CVE-2019-17354" }, { "db": "CNNVD", "id": "CNNVD-201910-506" } ] }, "id": "VAR-201910-1281", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-28446" }, { "db": "VULHUB", "id": "VHN-149592" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28446" } ] }, "last_update_date": "2023-12-18T12:43:15.777000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NBG-418N v2", "trust": 0.8, "url": "https://www.zyxel.com/us/en/support/downloadlandingsr.shtml?c=us\u0026l=en\u0026kbid=m-02059\u0026md=nbg-418n%20v2#searchzyxeltab1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-010637" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "CWE-287", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-149592" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "NVD", "id": "CVE-2019-17354" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://github.com/d0x0/zyxel-nbg-418n-v2/blob/master/cve-2019-17354" }, { "trust": 1.7, "url": "https://www.zyxel.com/us/en/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17354" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17354" } ], "sources": [ { "db": "VULHUB", "id": "VHN-149592" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "NVD", "id": "CVE-2019-17354" }, { "db": "CNNVD", "id": "CNNVD-201910-506" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-28446" }, { "db": "VULHUB", "id": "VHN-149592" }, { "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "db": "NVD", "id": "CVE-2019-17354" }, { "db": "CNNVD", "id": "CNNVD-201910-506" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-28446" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-149592" }, { "date": "2019-10-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "date": "2019-10-09T12:15:10.547000", "db": "NVD", "id": "CVE-2019-17354" }, { "date": "2019-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-506" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-28446" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-149592" }, { "date": "2019-10-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-010637" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-17354" }, { "date": "2020-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-506" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-506" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zyxel NBG-418N v2 Vulnerabilities related to authentication in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-010637" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-506" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | * | |
zyxel | nbg-418n | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF173A52-88FB-4D7A-A22B-8F016EE07E06", "versionEndIncluding": "1.00\\(aarp.13\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A format string vulnerability in a binary of the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker to cause denial-of-service (DoS) conditions on an affected device." } ], "id": "CVE-2023-22923", "lastModified": "2024-11-21T07:45:39.650", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-01T17:15:09.220", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/78819 | ||
cret@cert.org | http://www.securitytracker.com/id/1034554 | ||
cret@cert.org | https://www.kb.cert.org/vuls/id/330000 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/78819 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034554 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/330000 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | 1.00\(aadz.3\)c0 | |
zyxel | nbg-418n | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\\(aadz.3\\)c0:*:*:*:*:*:*:*", "matchCriteriaId": "8AFA8092-0BBB-4008-98E8-EB735021C19C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:*:*:*:*:*:*:*:*", "matchCriteriaId": "415EAB6F-841A-4B7E-8357-D0A0793C3E6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users." }, { "lang": "es", "value": "Vulnerabilidad de CSRF en dispositivos ZyXEL NBG-418N con firmware 1.00(AADZ.3)C0 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios." } ], "id": "CVE-2015-7284", "lastModified": "2024-11-21T02:36:30.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-31T05:59:26.217", "references": [ { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/78819" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id/1034554" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/330000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/78819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/330000" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://alicangonullu.biz/konu/3 | Exploit, Third Party Advisory | |
cve@mitre.org | https://twitter.com/god3err/status/1088067902832631809 | Third Party Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/46240/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://alicangonullu.biz/konu/3 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/god3err/status/1088067902832631809 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/46240/ | Exploit, Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | 1.00\(aaxm.6\)c0 | |
zyxel | nbg-418n | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\\(aaxm.6\\)c0:*:*:*:*:*:*:*", "matchCriteriaId": "62719E98-4188-45A7-AF80-2BBF45B9F168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF." }, { "lang": "es", "value": "Los dispositivos de Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices permiten Cross-Site Request Forgery (CSRF) en login.cgi." } ], "id": "CVE-2019-6710", "lastModified": "2024-11-21T04:46:59.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-07T23:29:01.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://alicangonullu.biz/konu/3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/god3err/status/1088067902832631809" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46240/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://alicangonullu.biz/konu/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/god3err/status/1088067902832631809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46240/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/78819 | ||
cret@cert.org | http://www.securitytracker.com/id/1034554 | ||
cret@cert.org | https://www.kb.cert.org/vuls/id/330000 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/78819 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034554 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/330000 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | 1.00\(aadz.3\)c0 | |
zyxel | nbg-418n | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\\(aadz.3\\)c0:*:*:*:*:*:*:*", "matchCriteriaId": "8AFA8092-0BBB-4008-98E8-EB735021C19C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A2E02E-9CDF-42B1-922E-953F5783F9F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." }, { "lang": "es", "value": "La interfaz de administraci\u00f3n web en dispositivos ZyXEL NBG-418N con firmware 1.00(AADZ.3)C0 tiene una contrase\u00f1a por defecto de 1234 para la cuenta admin, lo que permite a atacantes remotos obtener privilegios administrativos aprovechando una sesi\u00f3n LAN." } ], "id": "CVE-2015-7283", "lastModified": "2024-11-21T02:36:30.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-31T05:59:25.260", "references": [ { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/78819" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id/1034554" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/330000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/78819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/330000" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | * | |
zyxel | nbg-418n | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF173A52-88FB-4D7A-A22B-8F016EE07E06", "versionEndIncluding": "1.00\\(aarp.13\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to cause denial-of-service (DoS) conditions by executing crafted CLI commands on a vulnerable device." } ], "id": "CVE-2023-22924", "lastModified": "2024-11-21T07:45:39.770", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-01T17:15:09.273", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | * | |
zyxel | nbg-418n | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF173A52-88FB-4D7A-A22B-8F016EE07E06", "versionEndIncluding": "1.00\\(aarp.13\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote unauthenticated attacker to cause DoS conditions by sending crafted packets if Telnet is enabled on a vulnerable device." } ], "id": "CVE-2023-22922", "lastModified": "2024-11-21T07:45:39.523", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-01T17:15:09.163", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | * | |
zyxel | nbg-418n | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF173A52-88FB-4D7A-A22B-8F016EE07E06", "versionEndIncluding": "1.00\\(aarp.13\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to store malicious scripts using a web management interface parameter, resulting in denial-of-service (DoS) conditions on an affected device." } ], "id": "CVE-2023-22921", "lastModified": "2024-11-21T07:45:39.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 5.3, "source": "security@zyxel.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 5.3, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-01T17:15:09.110", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securitytracker.com/id/1034552 | ||
cret@cert.org | http://www.securitytracker.com/id/1034553 | ||
cret@cert.org | http://www.securitytracker.com/id/1034554 | ||
cret@cert.org | https://www.kb.cert.org/vuls/id/870744 | Third Party Advisory, US Government Resource | |
cret@cert.org | https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034552 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034553 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034554 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/870744 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n | - | |
zyxel | p-660hw-t1_2 | * | |
zyxel | zynos_firmware | 3.40\(axh.0\) | |
zyxel | pmg5318-b20a_firmware | v100aanc0b5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A2E02E-9CDF-42B1-922E-953F5783F9F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:p-660hw-t1_2:*:*:*:*:*:*:*:*", "matchCriteriaId": "A954D198-9DA4-4749-8CD1-2D39D895C801", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:zynos_firmware:3.40\\(axh.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "8E5012AD-E11A-46D3-B832-0CF7BD794245", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:pmg5318-b20a_firmware:v100aanc0b5:*:*:*:*:*:*:*", "matchCriteriaId": "B2128415-3791-4EFC-8ED0-E31BBEBDFADF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors." }, { "lang": "es", "value": "Dispositivos ZyXEL P-660HW-T1 2 con firmware ZyNOS 3.40(AXH.0), dispositivos PMG5318-B20A con firmware 1.00AANC0b5 y dispositivos NBG-418N tienen una contrase\u00f1a por defecto de 1234 para la cuenta de admin, lo que permite a atacantes remotos obtener acceso administrativo a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-6016", "lastModified": "2024-11-21T02:34:18.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-31T05:59:14.833", "references": [ { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id/1034552" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id/1034553" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id/1034554" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/870744" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/870744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vendor | Product | Version | |
---|---|---|---|
zyxel | nbg-418n_firmware | * | |
zyxel | nbg-418n | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C634CD0-9066-41F5-83F5-AE3AB68A85F4", "versionEndIncluding": "1.00\\(aarp.10\\)c0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.13)C0, which could allow an attacker to store malicious scripts in the Logs page of the GUI on a vulnerable device. A successful XSS attack could force an authenticated user to execute the stored malicious scripts and then result in a denial-of-service (DoS) condition when the user visits the Logs page of the GUI on the device." }, { "lang": "es", "value": "Una vulnerabilidad de cross-site scripting (XSS) en las versiones de firmware Zyxel NBG-418N v2 anteriores a la V1.00(AARP.13)C0, que podr\u00eda permitir a un atacante almacenar scripts maliciosos en la p\u00e1gina Registros de la GUI en un dispositivo vulnerable. Un ataque XSS exitoso podr\u00eda obligar a un usuario autenticado a ejecutar los scripts maliciosos almacenados y luego resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS) cuando el usuario visita la p\u00e1gina de Registros de la GUI del dispositivo." } ], "id": "CVE-2022-45441", "lastModified": "2024-12-06T07:15:05.190", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "security@zyxel.com.tw", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2023-02-07T02:15:07.967", "references": [ { "source": "security@zyxel.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-in-nbg-418n-v2-home-router" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-in-nbg-418n-v2-home-router" } ], "sourceIdentifier": "security@zyxel.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zyxel.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2023-22924
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | NBG-418N v2 firmware |
Version: < V1.00(AARP.14)C0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NBG-418N v2 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c V1.00(AARP.14)C0" } ] } ], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to cause denial-of-service (DoS) conditions by executing crafted CLI commands on a vulnerable device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-01T00:00:00", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ] } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-22924", "datePublished": "2023-05-01T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7284
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034554 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/78819 | vdb-entry, x_refsource_BID | |
https://www.kb.cert.org/vuls/id/330000 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:46.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034554", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034554" }, { "name": "78819", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78819" }, { "name": "VU#330000", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/330000" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T14:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "1034554", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034554" }, { "name": "78819", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/78819" }, { "name": "VU#330000", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/330000" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-7284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034554", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034554" }, { "name": "78819", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78819" }, { "name": "VU#330000", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/330000" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-7284", "datePublished": "2015-12-31T02:00:00", "dateReserved": "2015-09-18T00:00:00", "dateUpdated": "2024-08-06T07:43:46.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034554 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1034553 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1034552 | vdb-entry, x_refsource_SECTRACK | |
https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R | x_refsource_CONFIRM | |
https://www.kb.cert.org/vuls/id/870744 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:06:35.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034554", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034554" }, { "name": "1034553", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034553" }, { "name": "1034552", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R" }, { "name": "VU#870744", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/870744" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T14:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "1034554", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034554" }, { "name": "1034553", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034553" }, { "name": "1034552", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R" }, { "name": "VU#870744", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/870744" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-6016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034554", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034554" }, { "name": "1034553", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034553" }, { "name": "1034552", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034552" }, { "name": "https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R", "refsource": "CONFIRM", "url": "https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R" }, { "name": "VU#870744", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/870744" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-6016", "datePublished": "2015-12-31T02:00:00", "dateReserved": "2015-08-14T00:00:00", "dateUpdated": "2024-08-06T07:06:35.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-6710
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://twitter.com/god3err/status/1088067902832631809 | x_refsource_MISC | |
https://alicangonullu.biz/konu/3 | x_refsource_MISC | |
https://www.exploit-db.com/exploits/46240/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:03.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/god3err/status/1088067902832631809" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://alicangonullu.biz/konu/3" }, { "name": "46240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46240/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-08T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/god3err/status/1088067902832631809" }, { "tags": [ "x_refsource_MISC" ], "url": "https://alicangonullu.biz/konu/3" }, { "name": "46240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46240/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6710", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/god3err/status/1088067902832631809", "refsource": "MISC", "url": "https://twitter.com/god3err/status/1088067902832631809" }, { "name": "https://alicangonullu.biz/konu/3", "refsource": "MISC", "url": "https://alicangonullu.biz/konu/3" }, { "name": "46240", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46240/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6710", "datePublished": "2019-03-07T22:00:00", "dateReserved": "2019-01-23T00:00:00", "dateUpdated": "2024-08-04T20:31:03.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7283
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034554 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/78819 | vdb-entry, x_refsource_BID | |
https://www.kb.cert.org/vuls/id/330000 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:43:46.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034554", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034554" }, { "name": "78819", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78819" }, { "name": "VU#330000", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/330000" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T14:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "1034554", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034554" }, { "name": "78819", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/78819" }, { "name": "VU#330000", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/330000" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2015-7283", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034554", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034554" }, { "name": "78819", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78819" }, { "name": "VU#330000", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/330000" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2015-7283", "datePublished": "2015-12-31T02:00:00", "dateReserved": "2015-09-18T00:00:00", "dateUpdated": "2024-08-06T07:43:46.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22923
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | NBG-418N v2 firmware |
Version: < V1.00(AARP.14)C0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NBG-418N v2 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c V1.00(AARP.14)C0" } ] } ], "descriptions": [ { "lang": "en", "value": "A format string vulnerability in a binary of the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker to cause denial-of-service (DoS) conditions on an affected device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134: Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-01T00:00:00", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ] } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-22923", "datePublished": "2023-05-01T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22922
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | NBG-418N v2 firmware |
Version: < V1.00(AARP.14)C0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NBG-418N v2 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c V1.00(AARP.14)C0" } ] } ], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote unauthenticated attacker to cause DoS conditions by sending crafted packets if Telnet is enabled on a vulnerable device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-01T00:00:00", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ] } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-22922", "datePublished": "2023-05-01T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45441
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | NBG-418N v2 firmware |
Version: < V1.00(AARP.13)C0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:57.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-in-nbg-418n-v2-home-router" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NBG-418N v2 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c V1.00(AARP.13)C0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA cross-site scripting (XSS) vulnerability in Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.13)C0, which could allow an attacker to store malicious scripts in the Logs page of the GUI on a vulnerable device. A successful XSS attack could force an authenticated user to execute the stored malicious scripts and then result in a denial-of-service (DoS) condition when the user visits the Logs page of the GUI on the device.\u003c/p\u003e" } ], "value": "A cross-site scripting (XSS) vulnerability in Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.13)C0, which could allow an attacker to store malicious scripts in the Logs page of the GUI on a vulnerable device. A successful XSS attack could force an authenticated user to execute the stored malicious scripts and then result in a denial-of-service (DoS) condition when the user visits the Logs page of the GUI on the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T06:40:06.327Z", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-xss-vulnerability-in-nbg-418n-v2-home-router" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2022-45441", "datePublished": "2023-02-07T00:00:00", "dateReserved": "2022-11-15T00:00:00", "dateUpdated": "2024-12-06T06:40:06.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22921
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Zyxel | NBG-418N v2 firmware |
Version: < V1.00(AARP.14)C0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NBG-418N v2 firmware", "vendor": "Zyxel", "versions": [ { "status": "affected", "version": "\u003c V1.00(AARP.14)C0" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to store malicious scripts using a web management interface parameter, resulting in denial-of-service (DoS) conditions on an affected device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-04T00:00:00", "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel" }, "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router" } ] } }, "cveMetadata": { "assignerOrgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "assignerShortName": "Zyxel", "cveId": "CVE-2023-22921", "datePublished": "2023-05-01T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }