Search criteria
5 vulnerabilities by Keenetic
CVE-2025-56009 (GCVE-0-2025-56009)
Vulnerability from cvelistv5 – Published: 2025-10-23 00:00 – Updated: 2025-10-23 16:32
VLAI?
Summary
Cross site request forgery (CSRF) vulnerability in KeeneticOS before 4.3 at "/rci" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit.
Severity ?
5.3 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-56009",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-23T16:31:55.182524Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T16:32:41.907Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross site request forgery (CSRF) vulnerability in KeeneticOS before 4.3 at \"/rci\" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T14:27:11.188Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://keenetic.com/"
},
{
"url": "https://keenetic.com/global/security#october-2025-web-api-vulnerabilities"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-56009",
"datePublished": "2025-10-23T00:00:00.000Z",
"dateReserved": "2025-08-16T00:00:00.000Z",
"dateUpdated": "2025-10-23T16:32:41.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-56008 (GCVE-0-2025-56008)
Vulnerability from cvelistv5 – Published: 2025-10-23 00:00 – Updated: 2025-10-23 16:31
VLAI?
Summary
Cross site scripting (XSS) vulnerability in KeeneticOS before 4.3 at "Wireless ISP" page allows attackers located near to the router to takeover the device via adding additional users with full permissions.
Severity ?
6.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-56008",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-23T16:31:00.525936Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T16:31:35.076Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross site scripting (XSS) vulnerability in KeeneticOS before 4.3 at \"Wireless ISP\" page allows attackers located near to the router to takeover the device via adding additional users with full permissions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T14:26:22.278Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://keenetic.com/"
},
{
"url": "https://keenetic.com/global/security#october-2025-web-api-vulnerabilities"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-56008",
"datePublished": "2025-10-23T00:00:00.000Z",
"dateReserved": "2025-08-16T00:00:00.000Z",
"dateUpdated": "2025-10-23T16:31:35.076Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-56007 (GCVE-0-2025-56007)
Vulnerability from cvelistv5 – Published: 2025-10-23 00:00 – Updated: 2025-10-23 16:30
VLAI?
Summary
CRLF-injection in KeeneticOS before 4.3 at "/auth" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-56007",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-23T16:29:46.334322Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-93",
"description": "CWE-93 Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T16:30:30.136Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "CRLF-injection in KeeneticOS before 4.3 at \"/auth\" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-23T14:25:43.740Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://keenetic.com/"
},
{
"url": "https://keenetic.com/global/security#october-2025-web-api-vulnerabilities"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-56007",
"datePublished": "2025-10-23T00:00:00.000Z",
"dateReserved": "2025-08-16T00:00:00.000Z",
"dateUpdated": "2025-10-23T16:30:30.136Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-4022 (GCVE-0-2024-4022)
Vulnerability from cvelistv5 – Published: 2024-04-21 10:31 – Updated: 2024-08-01 20:26
VLAI?
Title
Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Version Data version.js information disclosure
Summary
A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /version.js of the component Version Data Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261674 is the identifier assigned to this vulnerability. NOTE: The vendor is aware of this issue and plans to fix it by the end of 2024.
Severity ?
5.3 (Medium)
5.3 (Medium)
CWE
- CWE-200 - Information Disclosure
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Keenetic | KN-1010 |
Affected:
1.6.49
Affected: 3.5.68 Affected: 3.7.77 Affected: 4.0.2.215 Affected: 4.1.2.14 Affected: 4.1.2.15 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
Credits
netsecfish (VulDB User)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:keenetic:kn_1010:1.6.49:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kn_1010",
"vendor": "keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"cpes": [
"cpe:2.3:a:keenetic:kn-1410:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kn-1410",
"vendor": "keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"cpes": [
"cpe:2.3:a:keenetic:kn-1711:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kn-1711",
"vendor": "keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"cpes": [
"cpe:2.3:a:keenetic:kn-1810:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kn-1810",
"vendor": "keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"cpes": [
"cpe:2.3:a:keenetic:kn-1910:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kn-1910",
"vendor": "keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-4022",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-20T17:21:24.240562Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-03T15:30:56.172Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:26:57.265Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-261674 | Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Version Data version.js information disclosure",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.261674"
},
{
"name": "VDB-261674 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.261674"
},
{
"name": "Submit #316276 | Keenetic Omni Router, Carrier Router, Viva Router, Ultra Router, Ultra II Router, Giga Router * 4.1.2.15/4.1.2.14/4.0.2.215/3.7.77/3.5.68/1.6.49 Information Disclosure",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://vuldb.com/?submit.316276"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://netsecfish.notion.site/Information-Disclosure-in-Keenetic-Router-d4a12a499cef4acf80e191bdaf20c151?pvs=4"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Version Data Handler"
],
"product": "KN-1010",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Version Data Handler"
],
"product": "KN-1410",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Version Data Handler"
],
"product": "KN-1711",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Version Data Handler"
],
"product": "KN-1810",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Version Data Handler"
],
"product": "KN-1910",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "netsecfish (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /version.js of the component Version Data Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261674 is the identifier assigned to this vulnerability. NOTE: The vendor is aware of this issue and plans to fix it by the end of 2024."
},
{
"lang": "de",
"value": "Eine problematische Schwachstelle wurde in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 bis 4.1.2.15 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /version.js der Komponente Version Data Handler. Mittels Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Information Disclosure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-22T12:38:32.107Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-261674 | Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Version Data version.js information disclosure",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.261674"
},
{
"name": "VDB-261674 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.261674"
},
{
"name": "Submit #316276 | Keenetic Omni Router, Carrier Router, Viva Router, Ultra Router, Ultra II Router, Giga Router * 4.1.2.15/4.1.2.14/4.0.2.215/3.7.77/3.5.68/1.6.49 Information Disclosure",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.316276"
},
{
"tags": [
"exploit"
],
"url": "https://netsecfish.notion.site/Information-Disclosure-in-Keenetic-Router-d4a12a499cef4acf80e191bdaf20c151?pvs=4"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-22T14:43:26.000Z",
"value": "VulDB entry last update"
}
],
"title": "Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Version Data version.js information disclosure"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-4022",
"datePublished": "2024-04-21T10:31:04.754Z",
"dateReserved": "2024-04-20T13:51:21.888Z",
"dateUpdated": "2024-08-01T20:26:57.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-4021 (GCVE-0-2024-4021)
Vulnerability from cvelistv5 – Published: 2024-04-21 10:00 – Updated: 2024-08-01 20:26
VLAI?
Title
Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Configuration Setting ndmComponents.js information disclosure
Summary
A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor is aware of this issue and plans to fix it by the end of 2024.
Severity ?
5.3 (Medium)
5.3 (Medium)
CWE
- CWE-200 - Information Disclosure
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Keenetic | KN-1010 |
Affected:
1.6.49
Affected: 3.5.68 Affected: 3.7.77 Affected: 4.0.2.215 Affected: 4.1.2.14 Affected: 4.1.2.15 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-4021",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-30T17:33:15.337526Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-30T17:33:44.821Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:26:57.279Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-261673 | Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Configuration Setting ndmComponents.js information disclosure",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.261673"
},
{
"name": "VDB-261673 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.261673"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://netsecfish.notion.site/Information-Disclosure-in-Keenetic-Router-d4a12a499cef4acf80e191bdaf20c151?pvs=4"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Configuration Setting Handler"
],
"product": "KN-1010",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Configuration Setting Handler"
],
"product": "KN-1410",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Configuration Setting Handler"
],
"product": "KN-1711",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Configuration Setting Handler"
],
"product": "KN-1810",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
},
{
"modules": [
"Configuration Setting Handler"
],
"product": "KN-1910",
"vendor": "Keenetic",
"versions": [
{
"status": "affected",
"version": "1.6.49"
},
{
"status": "affected",
"version": "3.5.68"
},
{
"status": "affected",
"version": "3.7.77"
},
{
"status": "affected",
"version": "4.0.2.215"
},
{
"status": "affected",
"version": "4.1.2.14"
},
{
"status": "affected",
"version": "4.1.2.15"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor is aware of this issue and plans to fix it by the end of 2024."
},
{
"lang": "de",
"value": "In Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 bis 4.1.2.15 wurde eine problematische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /ndmComponents.js der Komponente Configuration Setting Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Information Disclosure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-22T14:26:21.755Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-261673 | Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Configuration Setting ndmComponents.js information disclosure",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.261673"
},
{
"name": "VDB-261673 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.261673"
},
{
"tags": [
"exploit"
],
"url": "https://netsecfish.notion.site/Information-Disclosure-in-Keenetic-Router-d4a12a499cef4acf80e191bdaf20c151?pvs=4"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-22T16:31:15.000Z",
"value": "VulDB entry last update"
}
],
"title": "Keenetic KN-1010/KN-1410/KN-1711/KN-1810/KN-1910 Configuration Setting ndmComponents.js information disclosure"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-4021",
"datePublished": "2024-04-21T10:00:05.279Z",
"dateReserved": "2024-04-20T13:51:19.723Z",
"dateUpdated": "2024-08-01T20:26:57.279Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}