VAR-200607-0468
Vulnerability from variot - Updated: 2024-02-14 23:09Siemens SpeedStream 2624 allows remote attackers to cause a denial of service (device hang) by sending a crafted packet to the web administrative interface. Siemens SpeedStream Wireless Routers are prone to a remote denial-of-service vulnerability. This may permit an attacker to crash affected devices, denying further network services to legitimate users. Firmware version 2624 is vulnerable; other versions may also be affected.
Hardcore Disassembler / Reverse Engineer Wanted!
Want to work with IDA and BinDiff? Want to write PoC's and Exploits?
Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package.
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: Siemens SpeedStream 2624 Denial of Service Vulnerability
SECUNIA ADVISORY ID: SA21195
VERIFY ADVISORY: http://secunia.com/advisories/21195/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From local network
OPERATING SYSTEM: Siemens Speedstream 2624 http://secunia.com/product/10741/
DESCRIPTION: Jaime Blasco has reported a vulnerability in Siemens Speedstream 2624, which can be exploited by malicious people to cause a DoS (Denial of Service).
Successful exploitation causes the network device to stop responding.
SOLUTION: Restrict access to affected devices.
PROVIDED AND/OR DISCOVERED BY: Jaime Blasco
ORIGINAL ADVISORY: http://www.digitalarmaments.com/2006310665340982.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200607-0468",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "speedstream wireless router",
"scope": "eq",
"trust": 2.7,
"vendor": "siemens",
"version": "2624"
},
{
"model": "wireless router siemens",
"scope": "eq",
"trust": 0.6,
"vendor": "speedstream",
"version": "2624"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "speedstream router",
"version": "2624"
}
],
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "BID",
"id": "19132"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:speedstream_wireless_router:2624:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Jaime Blasco",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
}
],
"trust": 0.6
},
"cve": "CVE-2006-3907",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2006-3907",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2006-5761",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "367995b0-2354-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-20015",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-3907",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2006-5761",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200607-479",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-20015",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "VULHUB",
"id": "VHN-20015"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SpeedStream 2624 allows remote attackers to cause a denial of service (device hang) by sending a crafted packet to the web administrative interface. Siemens SpeedStream Wireless Routers are prone to a remote denial-of-service vulnerability. \nThis may permit an attacker to crash affected devices, denying further network services to legitimate users. \nFirmware version 2624 is vulnerable; other versions may also be affected. \n\n----------------------------------------------------------------------\n\nHardcore Disassembler / Reverse Engineer Wanted!\n\nWant to work with IDA and BinDiff?\nWant to write PoC\u0027s and Exploits?\n\nYour nationality is not important. \nWe will get you a work permit, find an apartment, and offer a\nrelocation compensation package. \n\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nSiemens SpeedStream 2624 Denial of Service Vulnerability\n\nSECUNIA ADVISORY ID:\nSA21195\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21195/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nSiemens Speedstream 2624\nhttp://secunia.com/product/10741/\n\nDESCRIPTION:\nJaime Blasco has reported a vulnerability in Siemens Speedstream\n2624, which can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nSuccessful exploitation causes the network device to stop responding. \n\nSOLUTION:\nRestrict access to affected devices. \n\nPROVIDED AND/OR DISCOVERED BY:\nJaime Blasco\n\nORIGINAL ADVISORY:\nhttp://www.digitalarmaments.com/2006310665340982.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3907"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "BID",
"id": "19132"
},
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-20015"
},
{
"db": "PACKETSTORM",
"id": "48533"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2006-3907",
"trust": 3.3
},
{
"db": "BID",
"id": "19132",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "21195",
"trust": 1.8
},
{
"db": "SREASON",
"id": "1292",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1016578",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-2969",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2006-5761",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935",
"trust": 0.8
},
{
"db": "XF",
"id": "27948",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20060724 DIGITAL ARMAMENTS SECURITY ADVISORY 24.07.2006: SIEMENS SPEEDSTREAM WIRELESS/ROUTER DENIAL OF SERVICE VULNERABILITY",
"trust": 0.6
},
{
"db": "IVD",
"id": "367995B0-2354-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-20015",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "48533",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "VULHUB",
"id": "VHN-20015"
},
{
"db": "BID",
"id": "19132"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"db": "PACKETSTORM",
"id": "48533"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"id": "VAR-200607-0468",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "VULHUB",
"id": "VHN-20015"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
}
]
},
"last_update_date": "2024-02-14T23:09:27.252000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://gigaset.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/19132"
},
{
"trust": 1.8,
"url": "http://www.digitalarmaments.com/2006310665340982.html"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1016578"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/21195"
},
{
"trust": 1.7,
"url": "http://securityreason.com/securityalert/1292"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/440985/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/2969"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27948"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3907"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3907"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/27948"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/440985/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/2969"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/"
},
{
"trust": 0.3,
"url": "/archive/1/440985"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/21195/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/10741/"
},
{
"trust": 0.1,
"url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "VULHUB",
"id": "VHN-20015"
},
{
"db": "BID",
"id": "19132"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"db": "PACKETSTORM",
"id": "48533"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "VULHUB",
"id": "VHN-20015"
},
{
"db": "BID",
"id": "19132"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"db": "PACKETSTORM",
"id": "48533"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-07-27T00:00:00",
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"date": "2006-07-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"date": "2006-07-27T00:00:00",
"db": "VULHUB",
"id": "VHN-20015"
},
{
"date": "2006-07-24T00:00:00",
"db": "BID",
"id": "19132"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"date": "2006-07-26T05:33:34",
"db": "PACKETSTORM",
"id": "48533"
},
{
"date": "2006-07-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"date": "2006-07-27T22:04:00",
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-07-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"date": "2018-10-17T00:00:00",
"db": "VULHUB",
"id": "VHN-20015"
},
{
"date": "2006-07-25T16:42:00",
"db": "BID",
"id": "19132"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-002935"
},
{
"date": "2006-08-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200607-479"
},
{
"date": "2024-02-14T01:17:43.863000",
"db": "NVD",
"id": "CVE-2006-3907"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SpeedStream Wireless Router web Management Interface Denial of Service Vulnerability",
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2006-5761"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "IVD",
"id": "367995b0-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-479"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.