CVE-2016-6277
Vulnerability from cvelistv5
Published
2016-12-14 16:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://kb.netgear.com/000036386/CVE-2016-582384 | Patch, Vendor Advisory | |
cve@mitre.org | http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/94819 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ | Broken Link, Mitigation, Third Party Advisory | |
cve@mitre.org | https://kalypto.org/research/netgear-vulnerability-expanded/ | Broken Link, Exploit, Third Party Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/40889/ | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.exploit-db.com/exploits/41598/ | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.kb.cert.org/vuls/id/582384 | Third Party Advisory, US Government Resource |
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-03-07
Due date: 2022-09-07
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-6277
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40889", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40889/" }, { "name": "41598", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41598/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.netgear.com/000036386/CVE-2016-582384" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/" }, { "name": "VU#582384", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/582384" }, { "name": "94819", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94819" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kalypto.org/research/netgear-vulnerability-expanded/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-07T00:00:00", "descriptions": [ { "lang": "en", "value": "NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T17:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "40889", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40889/" }, { "name": "41598", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41598/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.netgear.com/000036386/CVE-2016-582384" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/" }, { "name": "VU#582384", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/582384" }, { "name": "94819", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94819" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kalypto.org/research/netgear-vulnerability-expanded/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40889", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40889/" }, { "name": "41598", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41598/" }, { "name": "http://kb.netgear.com/000036386/CVE-2016-582384", "refsource": "CONFIRM", "url": "http://kb.netgear.com/000036386/CVE-2016-582384" }, { "name": "http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/", "refsource": "MISC", "url": "http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/" }, { "name": "VU#582384", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/582384" }, { "name": "94819", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94819" }, { "name": "https://kalypto.org/research/netgear-vulnerability-expanded/", "refsource": "MISC", "url": "https://kalypto.org/research/netgear-vulnerability-expanded/" }, { "name": "http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6277", "datePublished": "2016-12-14T16:00:00", "dateReserved": "2016-07-22T00:00:00", "dateUpdated": "2024-08-06T01:22:20.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2016-6277", "cwes": "[\"CWE-352\"]", "dateAdded": "2022-03-07", "dueDate": "2022-09-07", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-6277", "product": "Multiple Routers", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "NETGEAR confirmed multiple routers allow unauthenticated web pages to pass form input directly to the command-line interface, permitting remote code execution.", "vendorProject": "NETGEAR", "vulnerabilityName": "NETGEAR Multiple Routers Remote Code Execution Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2016-6277\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-12-14T16:59:00.350\",\"lastModified\":\"2024-07-16T17:43:58.997\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"cisaExploitAdd\":\"2022-03-07\",\"cisaActionDue\":\"2022-09-07\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"NETGEAR Multiple Routers Remote Code Execution Vulnerability\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.\"},{\"lang\":\"es\",\"value\":\"NETGEAR R6250 en versiones anteriores a 1.0.4.6.Beta, R6400 en versiones anteriores a 1.0.1.18.Beta, R6700 en versiones anteriores a 1.0.1.14.Beta, R6900, R7000 en versiones anteriores a 1.0.7.6.Beta, R7100LG en versiones anteriores a 1.0.0.28.Beta, R7300DST en versiones anteriores a 1.0.0.46.Beta, R7900 en versiones anteriores a 1.0.1.8.Beta, R8000 en versiones anteriores a 1.0.3.26.Beta, D6220, D6400, D7000 y posiblemente otros routers permiten a atacantes remotos ejecutar comandos a trav\u00e9s de metacaract\u00e9res shell en la ruta info a cgi-bin/.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.0.22\",\"matchCriteriaId\":\"DAF7A31E-C1DC-4E58-88EE-FA3A9789019F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EEA190-2E9C-4586-BF81-B115532FBA23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.0.56\",\"matchCriteriaId\":\"A08DA055-1A32-43BE-ABF8-42749B128C5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D30939B-86E3-4C78-9B05-686B4994C8B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.6_10.1.12\",\"matchCriteriaId\":\"6C6FED5E-959B-403B-8770-BE16123ACDB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"321BE843-52C4-4638-A321-439CA7B3A6F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1.18\",\"matchCriteriaId\":\"1788A7DF-F29A-4A71-BDC8-8CAAB37F59A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1.14\",\"matchCriteriaId\":\"55F9D994-3ACD-4608-84D4-070576FD23EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B27F11-4262-4CE1-8107-B365A7C152F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1.14\",\"matchCriteriaId\":\"F990A820-178D-4353-8C9A-D575A41A1C69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0794BB7C-1BCF-4F08-8EB2-9C3B150C105A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.7.2_1.1.93\",\"matchCriteriaId\":\"1BE6F59B-4520-40E4-8E59-0EB72844297F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.0.28\",\"matchCriteriaId\":\"D4B29972-7657-41E4-AB1D-F2183479927E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366FA778-3C2A-42AF-9141-DAD7043B406C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.0.46\",\"matchCriteriaId\":\"103B8B8E-A5C1-4717-BA09-6E9C3B784BBE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75148EB-DE6C-4C5C-BF34-4800A66CF11C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1.8\",\"matchCriteriaId\":\"748C0BC1-A42B-41BA-AD88-116C160EBE8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C484840F-AF30-4B5C-821A-4DB9BE407BDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.3.26\",\"matchCriteriaId\":\"192A2E30-17D1-4DB4-892C-E15CB32BDA25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B39F095-8FE8-43FD-A866-7B613B495984\"}]}]}],\"references\":[{\"url\":\"http://kb.netgear.com/000036386/CVE-2016-582384\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/94819\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://kalypto.org/research/netgear-vulnerability-expanded/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40889/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41598/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/582384\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.