Search criteria
18 vulnerabilities found for netmodule_router_software by netmodule
FKIE_CVE-2023-46306
Vulnerability from fkie_nvd - Published: 2023-10-22 21:15 - Updated: 2024-11-21 08:28
Severity ?
8.4 (High) - CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
6.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B651903-7598-4F86-B2C1-53923B573509",
"versionEndExcluding": "4.6.0.105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B543F356-8395-4F7E-A3C8-1A5DB362533C",
"versionEndExcluding": "4.7.0.103",
"versionStartIncluding": "4.7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0408E588-146F-4AD2-9D58-A12EBA83A697",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105."
},
{
"lang": "es",
"value": "La interfaz de administraci\u00f3n web en NetModule Router Software (NRSW) 4.6 anterior a 4.6.0.106 y 4.8 anterior a 4.8.0.101 ejecuta un comando del sistema operativo construido con entrada de usuario no sanitizada: metacaracteres de shell en el par\u00e1metro /admin/gnssAutoAlign.php device_id. Esto ocurre porque se puede iniciar otro subproceso antes de la captura que activa la funci\u00f3n de limpieza. Un exploit exitoso podr\u00eda permitir a un usuario autenticado ejecutar comandos arbitrarios con privilegios elevados. NOTA: esto es diferente de CVE-2023-0861 y CVE-2023-0862, que se corrigieron en la versi\u00f3n 4.6.0.105."
}
],
"id": "CVE-2023-46306",
"lastModified": "2024-11-21T08:28:16.250",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-22T21:15:07.930",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-0862
Vulnerability from fkie_nvd - Published: 2023-02-16 10:15 - Updated: 2024-11-21 07:37
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.
This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.
References
| URL | Tags | ||
|---|---|---|---|
| research@onekey.com | https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/ | Third Party Advisory | |
| research@onekey.com | https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf | Release Notes, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | nb1601 | - | |
| netmodule | nb1800 | - | |
| netmodule | nb1810 | - | |
| netmodule | nb2800 | - | |
| netmodule | nb2810 | - | |
| netmodule | nb3701 | - | |
| netmodule | nb3800 | - | |
| netmodule | nb800 | - | |
| netmodule | ng800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6AD24E-E27F-4078-8066-AB0E0D1CAA33",
"versionEndExcluding": "4.3.0.119",
"versionStartIncluding": "4.3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8000F0E9-A55B-472E-B71E-20097FC15C58",
"versionEndExcluding": "4.4.0.118",
"versionStartIncluding": "4.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFBFAD7-53CB-4755-A338-2FE945B3689F",
"versionEndExcluding": "4.6.0.105",
"versionStartIncluding": "4.6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B543F356-8395-4F7E-A3C8-1A5DB362533C",
"versionEndExcluding": "4.7.0.103",
"versionStartIncluding": "4.7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0408E588-146F-4AD2-9D58-A12EBA83A697",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.\n\nThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\n"
}
],
"id": "CVE-2023-0862",
"lastModified": "2024-11-21T07:37:59.533",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "research@onekey.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-16T10:15:11.983",
"references": [
{
"source": "research@onekey.com",
"tags": [
"Third Party Advisory"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/"
},
{
"source": "research@onekey.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
}
],
"sourceIdentifier": "research@onekey.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "research@onekey.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0861
Vulnerability from fkie_nvd - Published: 2023-02-16 09:15 - Updated: 2024-11-21 07:37
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.
This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | nb1601 | - | |
| netmodule | nb1800 | - | |
| netmodule | nb1810 | - | |
| netmodule | nb2800 | - | |
| netmodule | nb2810 | - | |
| netmodule | nb3701 | - | |
| netmodule | nb3800 | - | |
| netmodule | nb800 | - | |
| netmodule | ng800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6AD24E-E27F-4078-8066-AB0E0D1CAA33",
"versionEndExcluding": "4.3.0.119",
"versionStartIncluding": "4.3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8000F0E9-A55B-472E-B71E-20097FC15C58",
"versionEndExcluding": "4.4.0.118",
"versionStartIncluding": "4.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFBFAD7-53CB-4755-A338-2FE945B3689F",
"versionEndExcluding": "4.6.0.105",
"versionStartIncluding": "4.6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B543F356-8395-4F7E-A3C8-1A5DB362533C",
"versionEndExcluding": "4.7.0.103",
"versionStartIncluding": "4.7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0408E588-146F-4AD2-9D58-A12EBA83A697",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input.\u00a0A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.\nThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\n\n"
}
],
"id": "CVE-2023-0861",
"lastModified": "2024-11-21T07:37:59.410",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "research@onekey.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-16T09:15:10.237",
"references": [
{
"source": "research@onekey.com",
"tags": [
"Third Party Advisory"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities"
},
{
"source": "research@onekey.com",
"tags": [
"Release Notes"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
}
],
"sourceIdentifier": "research@onekey.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "research@onekey.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-39290
Vulnerability from fkie_nvd - Published: 2021-08-23 05:15 - Updated: 2024-11-21 06:19
Severity ?
Summary
Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://seclists.org/fulldisclosure/2021/Aug/22 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.netmodule.com | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/fulldisclosure/2021/Aug/22 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.netmodule.com | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | nb1600 | - | |
| netmodule | nb1601 | - | |
| netmodule | nb1800 | - | |
| netmodule | nb1810 | - | |
| netmodule | nb2700 | - | |
| netmodule | nb2710 | - | |
| netmodule | nb2800 | - | |
| netmodule | nb2810 | - | |
| netmodule | nb3700 | - | |
| netmodule | nb3701 | - | |
| netmodule | nb3710 | - | |
| netmodule | nb3711 | - | |
| netmodule | nb3720 | - | |
| netmodule | nb3800 | - | |
| netmodule | nb800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "012DBD5F-C5F7-472F-98F0-0EE481A1A39D",
"versionEndExcluding": "4.3.0.113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46A74835-CD8C-4CD7-98B5-0820A02DEAA0",
"versionEndExcluding": "4.4.0.111",
"versionStartIncluding": "4.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09DCDB3A-0E51-4C6E-8423-DD2F84C64478",
"versionEndExcluding": "4.5.0.105",
"versionStartIncluding": "4.5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D275CDC-0FE9-40C6-8CD4-3C836458C6C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7751755B-A1A8-4538-94D1-A49FC40565A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AFE5094-EA46-4389-880F-32E892BC703D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79C621EF-0650-418D-B39D-C07FE4728DB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78EBE526-E036-4FCC-B617-376ABC679111",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
"matchCriteriaId": "923D8D38-E3DB-47C0-92C3-AD1A05EEAC83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E345B5-CF76-4385-B4C3-B7F00DB0C52B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
},
{
"lang": "es",
"value": "Determinados dispositivos NetModule permiten la Fijaci\u00f3n de Sesi\u00f3n Limitada por medio de PHPSESSID. Estos modelos con versiones de firmware anteriores a 4.3.0.113, 4.4.0.111 y 4.5.0.105 est\u00e1n afectados: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720 y NB3800."
}
],
"id": "CVE-2021-39290",
"lastModified": "2024-11-21T06:19:07.793",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-23T05:15:08.430",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.netmodule.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.netmodule.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-384"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-39289
Vulnerability from fkie_nvd - Published: 2021-08-23 05:15 - Updated: 2024-11-21 06:19
Severity ?
Summary
Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://seclists.org/fulldisclosure/2021/Aug/22 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.netmodule.com | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Aug/22 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.netmodule.com | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | nb1600 | - | |
| netmodule | nb1601 | - | |
| netmodule | nb1800 | - | |
| netmodule | nb1810 | - | |
| netmodule | nb2700 | - | |
| netmodule | nb2710 | - | |
| netmodule | nb2800 | - | |
| netmodule | nb2810 | - | |
| netmodule | nb3700 | - | |
| netmodule | nb3701 | - | |
| netmodule | nb3710 | - | |
| netmodule | nb3711 | - | |
| netmodule | nb3720 | - | |
| netmodule | nb3800 | - | |
| netmodule | nb800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "012DBD5F-C5F7-472F-98F0-0EE481A1A39D",
"versionEndExcluding": "4.3.0.113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46A74835-CD8C-4CD7-98B5-0820A02DEAA0",
"versionEndExcluding": "4.4.0.111",
"versionStartIncluding": "4.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09DCDB3A-0E51-4C6E-8423-DD2F84C64478",
"versionEndExcluding": "4.5.0.105",
"versionStartIncluding": "4.5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D275CDC-0FE9-40C6-8CD4-3C836458C6C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7751755B-A1A8-4538-94D1-A49FC40565A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AFE5094-EA46-4389-880F-32E892BC703D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79C621EF-0650-418D-B39D-C07FE4728DB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78EBE526-E036-4FCC-B617-376ABC679111",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
"matchCriteriaId": "923D8D38-E3DB-47C0-92C3-AD1A05EEAC83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E345B5-CF76-4385-B4C3-B7F00DB0C52B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
},
{
"lang": "es",
"value": "Determinados dispositivos NetModule presentan un Manejo no Seguro de la Contrase\u00f1a (texto sin cifrar o encriptaci\u00f3n reversible), Estos modelos con versiones de firmware anteriores a 4.3.0.113, 4.4.0.111 y 4.5.0.105 est\u00e1n afectados: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720 y NB3800."
}
],
"id": "CVE-2021-39289",
"lastModified": "2024-11-21T06:19:07.593",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-23T05:15:08.380",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.netmodule.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.netmodule.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-39291
Vulnerability from fkie_nvd - Published: 2021-08-23 05:15 - Updated: 2024-11-21 06:19
Severity ?
Summary
Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://seclists.org/fulldisclosure/2021/Aug/22 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.netmodule.com | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/fulldisclosure/2021/Aug/22 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.netmodule.com | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | netmodule_router_software | * | |
| netmodule | nb1600 | - | |
| netmodule | nb1601 | - | |
| netmodule | nb1800 | - | |
| netmodule | nb1810 | - | |
| netmodule | nb2700 | - | |
| netmodule | nb2710 | - | |
| netmodule | nb2800 | - | |
| netmodule | nb2810 | - | |
| netmodule | nb3700 | - | |
| netmodule | nb3701 | - | |
| netmodule | nb3710 | - | |
| netmodule | nb3711 | - | |
| netmodule | nb3720 | - | |
| netmodule | nb3800 | - | |
| netmodule | nb800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "012DBD5F-C5F7-472F-98F0-0EE481A1A39D",
"versionEndExcluding": "4.3.0.113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46A74835-CD8C-4CD7-98B5-0820A02DEAA0",
"versionEndExcluding": "4.4.0.111",
"versionStartIncluding": "4.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09DCDB3A-0E51-4C6E-8423-DD2F84C64478",
"versionEndExcluding": "4.5.0.105",
"versionStartIncluding": "4.5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D275CDC-0FE9-40C6-8CD4-3C836458C6C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7751755B-A1A8-4538-94D1-A49FC40565A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AFE5094-EA46-4389-880F-32E892BC703D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79C621EF-0650-418D-B39D-C07FE4728DB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78EBE526-E036-4FCC-B617-376ABC679111",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
"matchCriteriaId": "923D8D38-E3DB-47C0-92C3-AD1A05EEAC83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E345B5-CF76-4385-B4C3-B7F00DB0C52B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
},
{
"lang": "es",
"value": "Determinados dispositivos NetModule permiten obtener credenciales por medio de par\u00e1metros GET a CLI-PHP. Estos modelos con versiones de firmware anteriores a 4.3.0.113, 4.4.0.111 y 4.5.0.105 est\u00e1n afectados: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720 y NB3800."
}
],
"id": "CVE-2021-39291",
"lastModified": "2024-11-21T06:19:07.980",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-23T05:15:08.473",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.netmodule.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.netmodule.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-46306 (GCVE-0-2023-46306)
Vulnerability from cvelistv5 – Published: 2023-10-22 00:00 – Updated: 2024-09-12 18:22
VLAI?
Summary
The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
Severity ?
8.4 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:45:40.734Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:netmodule:netmodule_router_software:4.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "netmodule_router_software",
"vendor": "netmodule",
"versions": [
{
"lessThan": "4.6.0.106",
"status": "affected",
"version": "4.6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:netmodule:netmodule_router_software:4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "netmodule_router_software",
"vendor": "netmodule",
"versions": [
{
"lessThan": "4.8.0.101",
"status": "affected",
"version": "4.8",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-46306",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-12T18:17:05.575956Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-12T18:22:55.873Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-22T20:07:16.731137",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf"
},
{
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf"
},
{
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-46306",
"datePublished": "2023-10-22T00:00:00",
"dateReserved": "2023-10-22T00:00:00",
"dateUpdated": "2024-09-12T18:22:55.873Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0862 (GCVE-0-2023-0862)
Vulnerability from cvelistv5 – Published: 2023-02-16 09:07 – Updated: 2025-03-18 14:50
VLAI?
Summary
The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.
This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.
Severity ?
7.2 (High)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Credits
Quentin Kaiser from ONEKEY Research Labs
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.659Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0862",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T14:50:33.476944Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T14:50:42.840Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"web administration interface"
],
"product": "NSRW",
"vendor": "NetModule",
"versions": [
{
"lessThan": "4.3.0.119",
"status": "affected",
"version": "4.3.0.0",
"versionType": "4.3.0.119"
},
{
"lessThan": "4.4.0.118",
"status": "affected",
"version": "4.4.0.0",
"versionType": "4.4.0.118"
},
{
"lessThan": "4.6.0.105",
"status": "affected",
"version": "4.6.0.0",
"versionType": "4.6.0.105"
},
{
"lessThan": "4.7.0.103",
"status": "affected",
"version": "4.7.0.0",
"versionType": "4.7.0.103"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Quentin Kaiser from ONEKEY Research Labs"
}
],
"datePublic": "2023-02-16T09:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.\u003cbr\u003e\u003cbr\u003eThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\u003cbr\u003e"
}
],
"value": "The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.\n\nThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-126",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-126 Path Traversal"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-21T08:24:22.762Z",
"orgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"shortName": "ONEKEY"
},
"references": [
{
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Path Traversal in NetModule NSRW",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"assignerShortName": "ONEKEY",
"cveId": "CVE-2023-0862",
"datePublished": "2023-02-16T09:07:09.930Z",
"dateReserved": "2023-02-16T09:01:36.192Z",
"dateUpdated": "2025-03-18T14:50:42.840Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0861 (GCVE-0-2023-0861)
Vulnerability from cvelistv5 – Published: 2023-02-16 08:58 – Updated: 2025-03-18 14:54
VLAI?
Summary
NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.
This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.
Severity ?
7.2 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
Impacted products
Credits
Quentin Kaiser from ONEKEY Research Labs
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.694Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0861",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T14:54:45.830831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T14:54:51.639Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"web administration interface"
],
"platforms": [
"Linux"
],
"product": "NSRW",
"vendor": "NetModule",
"versions": [
{
"lessThan": "4.3.0.119",
"status": "affected",
"version": "4.3.0.0",
"versionType": "4.3.0.119"
},
{
"lessThan": "4.4.0.118",
"status": "affected",
"version": "4.4.0.0",
"versionType": "4.4.0.118"
},
{
"lessThan": "4.6.0.105",
"status": "affected",
"version": "4.6.0.0",
"versionType": "4.6.0.105"
},
{
"lessThan": "4.7.0.103",
"status": "affected",
"version": "4.7.0.0",
"versionType": "4.7.0.103"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Quentin Kaiser from ONEKEY Research Labs"
}
],
"datePublic": "2023-02-16T09:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input.\u0026nbsp;A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.\u003cbr\u003e\u003cp\u003eThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\u003c/p\u003e"
}
],
"value": "NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input.\u00a0A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.\nThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\n\n"
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Proof-of-concept."
}
],
"value": "Proof-of-concept."
}
],
"impacts": [
{
"capecId": "CAPEC-248",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-248 Command Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-21T08:24:45.882Z",
"orgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"shortName": "ONEKEY"
},
"references": [
{
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Command Injection in NetModule NSRW",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"assignerShortName": "ONEKEY",
"cveId": "CVE-2023-0861",
"datePublished": "2023-02-16T08:58:43.370Z",
"dateReserved": "2023-02-16T08:48:31.394Z",
"dateUpdated": "2025-03-18T14:54:51.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39291 (GCVE-0-2021-39291)
Vulnerability from cvelistv5 – Published: 2021-08-23 04:37 – Updated: 2024-08-04 02:06
VLAI?
Summary
Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:40.940Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T04:37:50",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39291",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.netmodule.com",
"refsource": "MISC",
"url": "https://www.netmodule.com"
},
{
"name": "https://seclists.org/fulldisclosure/2021/Aug/22",
"refsource": "MISC",
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39291",
"datePublished": "2021-08-23T04:37:50",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:40.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39290 (GCVE-0-2021-39290)
Vulnerability from cvelistv5 – Published: 2021-08-23 04:35 – Updated: 2024-08-04 02:06
VLAI?
Summary
Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.375Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T04:35:45",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39290",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.netmodule.com",
"refsource": "MISC",
"url": "https://www.netmodule.com"
},
{
"name": "https://seclists.org/fulldisclosure/2021/Aug/22",
"refsource": "MISC",
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39290",
"datePublished": "2021-08-23T04:35:45",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:41.375Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39289 (GCVE-0-2021-39289)
Vulnerability from cvelistv5 – Published: 2021-08-23 04:33 – Updated: 2024-08-04 02:06
VLAI?
Summary
Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.380Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T04:33:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39289",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.netmodule.com",
"refsource": "MISC",
"url": "https://www.netmodule.com"
},
{
"name": "http://seclists.org/fulldisclosure/2021/Aug/22",
"refsource": "CONFIRM",
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39289",
"datePublished": "2021-08-23T04:33:03",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:41.380Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-46306 (GCVE-0-2023-46306)
Vulnerability from nvd – Published: 2023-10-22 00:00 – Updated: 2024-09-12 18:22
VLAI?
Summary
The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
Severity ?
8.4 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:45:40.734Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:netmodule:netmodule_router_software:4.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "netmodule_router_software",
"vendor": "netmodule",
"versions": [
{
"lessThan": "4.6.0.106",
"status": "affected",
"version": "4.6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:netmodule:netmodule_router_software:4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "netmodule_router_software",
"vendor": "netmodule",
"versions": [
{
"lessThan": "4.8.0.101",
"status": "affected",
"version": "4.8",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-46306",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-12T18:17:05.575956Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-12T18:22:55.873Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-22T20:07:16.731137",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf"
},
{
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf"
},
{
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-46306",
"datePublished": "2023-10-22T00:00:00",
"dateReserved": "2023-10-22T00:00:00",
"dateUpdated": "2024-09-12T18:22:55.873Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0862 (GCVE-0-2023-0862)
Vulnerability from nvd – Published: 2023-02-16 09:07 – Updated: 2025-03-18 14:50
VLAI?
Summary
The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.
This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.
Severity ?
7.2 (High)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Credits
Quentin Kaiser from ONEKEY Research Labs
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.659Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0862",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T14:50:33.476944Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T14:50:42.840Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"web administration interface"
],
"product": "NSRW",
"vendor": "NetModule",
"versions": [
{
"lessThan": "4.3.0.119",
"status": "affected",
"version": "4.3.0.0",
"versionType": "4.3.0.119"
},
{
"lessThan": "4.4.0.118",
"status": "affected",
"version": "4.4.0.0",
"versionType": "4.4.0.118"
},
{
"lessThan": "4.6.0.105",
"status": "affected",
"version": "4.6.0.0",
"versionType": "4.6.0.105"
},
{
"lessThan": "4.7.0.103",
"status": "affected",
"version": "4.7.0.0",
"versionType": "4.7.0.103"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Quentin Kaiser from ONEKEY Research Labs"
}
],
"datePublic": "2023-02-16T09:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.\u003cbr\u003e\u003cbr\u003eThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\u003cbr\u003e"
}
],
"value": "The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges.\n\nThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-126",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-126 Path Traversal"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-21T08:24:22.762Z",
"orgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"shortName": "ONEKEY"
},
"references": [
{
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Path Traversal in NetModule NSRW",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"assignerShortName": "ONEKEY",
"cveId": "CVE-2023-0862",
"datePublished": "2023-02-16T09:07:09.930Z",
"dateReserved": "2023-02-16T09:01:36.192Z",
"dateUpdated": "2025-03-18T14:50:42.840Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0861 (GCVE-0-2023-0861)
Vulnerability from nvd – Published: 2023-02-16 08:58 – Updated: 2025-03-18 14:54
VLAI?
Summary
NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.
This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.
Severity ?
7.2 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
Impacted products
Credits
Quentin Kaiser from ONEKEY Research Labs
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.694Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0861",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T14:54:45.830831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T14:54:51.639Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"web administration interface"
],
"platforms": [
"Linux"
],
"product": "NSRW",
"vendor": "NetModule",
"versions": [
{
"lessThan": "4.3.0.119",
"status": "affected",
"version": "4.3.0.0",
"versionType": "4.3.0.119"
},
{
"lessThan": "4.4.0.118",
"status": "affected",
"version": "4.4.0.0",
"versionType": "4.4.0.118"
},
{
"lessThan": "4.6.0.105",
"status": "affected",
"version": "4.6.0.0",
"versionType": "4.6.0.105"
},
{
"lessThan": "4.7.0.103",
"status": "affected",
"version": "4.7.0.0",
"versionType": "4.7.0.103"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Quentin Kaiser from ONEKEY Research Labs"
}
],
"datePublic": "2023-02-16T09:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input.\u0026nbsp;A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.\u003cbr\u003e\u003cp\u003eThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\u003c/p\u003e"
}
],
"value": "NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input.\u00a0A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges.\nThis issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103.\n\n"
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Proof-of-concept."
}
],
"value": "Proof-of-concept."
}
],
"impacts": [
{
"capecId": "CAPEC-248",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-248 Command Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-21T08:24:45.882Z",
"orgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"shortName": "ONEKEY"
},
"references": [
{
"url": "https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf"
},
{
"url": "https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Command Injection in NetModule NSRW",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846",
"assignerShortName": "ONEKEY",
"cveId": "CVE-2023-0861",
"datePublished": "2023-02-16T08:58:43.370Z",
"dateReserved": "2023-02-16T08:48:31.394Z",
"dateUpdated": "2025-03-18T14:54:51.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39291 (GCVE-0-2021-39291)
Vulnerability from nvd – Published: 2021-08-23 04:37 – Updated: 2024-08-04 02:06
VLAI?
Summary
Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:40.940Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T04:37:50",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39291",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NetModule devices allow credentials via GET parameters to CLI-PHP. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.netmodule.com",
"refsource": "MISC",
"url": "https://www.netmodule.com"
},
{
"name": "https://seclists.org/fulldisclosure/2021/Aug/22",
"refsource": "MISC",
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39291",
"datePublished": "2021-08-23T04:37:50",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:40.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39290 (GCVE-0-2021-39290)
Vulnerability from nvd – Published: 2021-08-23 04:35 – Updated: 2024-08-04 02:06
VLAI?
Summary
Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.375Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T04:35:45",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39290",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NetModule devices allow Limited Session Fixation via PHPSESSID. These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.netmodule.com",
"refsource": "MISC",
"url": "https://www.netmodule.com"
},
{
"name": "https://seclists.org/fulldisclosure/2021/Aug/22",
"refsource": "MISC",
"url": "https://seclists.org/fulldisclosure/2021/Aug/22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39290",
"datePublished": "2021-08-23T04:35:45",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:41.375Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-39289 (GCVE-0-2021-39289)
Vulnerability from nvd – Published: 2021-08-23 04:33 – Updated: 2024-08-04 02:06
VLAI?
Summary
Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T02:06:41.380Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-23T04:33:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.netmodule.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-39289",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NetModule devices have Insecure Password Handling (cleartext or reversible encryption), These models with firmware before 4.3.0.113, 4.4.0.111, and 4.5.0.105 are affected: NB800, NB1600, NB1601, NB1800, NB1810, NB2700, NB2710, NB2800, NB2810, NB3700, NB3701, NB3710, NB3711, NB3720, and NB3800."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.netmodule.com",
"refsource": "MISC",
"url": "https://www.netmodule.com"
},
{
"name": "http://seclists.org/fulldisclosure/2021/Aug/22",
"refsource": "CONFIRM",
"url": "http://seclists.org/fulldisclosure/2021/Aug/22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-39289",
"datePublished": "2021-08-23T04:33:03",
"dateReserved": "2021-08-18T00:00:00",
"dateUpdated": "2024-08-04T02:06:41.380Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}