VAR-200810-0116

Vulnerability from variot - Updated: 2023-12-18 13:58

Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote. The Linksys WAP4400N device is a high-speed wireless access point. No detailed vulnerability details are available. The impact of this issue is currently unknown. We will update this BID when more information emerges. NOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. ----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/


TITLE: Linksys WAP4400N Denial of Service and SNMPv3 Vulnerability

SECUNIA ADVISORY ID: SA32259

VERIFY ADVISORY: http://secunia.com/advisories/32259/

CRITICAL: Moderately critical

IMPACT: Unknown, DoS

WHERE:

From remote

OPERATING SYSTEM: Linksys WAP4400N http://secunia.com/advisories/product/20144/

DESCRIPTION: Some vulnerabilities have been reported in Linksys WAP4400N, where one has unknown impacts and the other can be exploited by malicious people to cause a DoS (Denial of Service).

1) An error within the processing of association requests can be exploited to reboot or hang-up the device by sending a specially crafted association request.

Successful exploitation requires that the access point runs in WEP mode. No more information is currently available. http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper

PROVIDED AND/OR DISCOVERED BY: 1) Laurent Butti and Julien Tinnes, France Telecom / Orange 2) Reported by the vendor.

ORIGINAL ADVISORY: http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0116",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wap400n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.2.14"
      },
      {
        "model": "wap4400n",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "linksys",
        "version": "1.2.14"
      },
      {
        "model": "wap400n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco linksys",
        "version": "1.2.14"
      },
      {
        "model": "wap4400n",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.2.17"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "BID",
        "id": "56356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:linksys:wap400n:1.2.14:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:marvell:88w8361p-bem1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "56356"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2008-4594",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2008-4594",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-34719",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-4594",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200810-292",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-34719",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote. The Linksys WAP4400N device is a high-speed wireless access point. No detailed vulnerability details are available. \nThe impact of this issue is currently unknown. We will update this BID when more information emerges. \nNOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WAP4400N Denial of Service and SNMPv3 Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32259\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32259/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nUnknown, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nLinksys WAP4400N\nhttp://secunia.com/advisories/product/20144/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Linksys WAP4400N, where\none has unknown impacts and the other can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\n1) An error within the processing of association requests can be\nexploited to reboot or hang-up the device by sending a specially\ncrafted association request. \n\nSuccessful exploitation requires that the access point runs in WEP\nmode. No more\ninformation is currently available. \nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Laurent Butti and Julien Tinnes, France Telecom / Orange\n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "BID",
        "id": "56356"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-4594",
        "trust": 3.4
      },
      {
        "db": "SECUNIA",
        "id": "32259",
        "trust": 2.4
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-2805",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "45842",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "4400",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "56356",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-34719",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "70926",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "db": "BID",
        "id": "56356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "id": "VAR-200810-0116",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34719"
      }
    ],
    "trust": 1.2999999999999998
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:58:10.595000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Linksys",
        "trust": 0.8,
        "url": "http://home.cisco.com/en-apac/home"
      },
      {
        "title": "Linksys WAP4400N SNMPv3 component has an unspecified vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/24534"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/32259"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/2805"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
      },
      {
        "trust": 1.1,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4594"
      },
      {
        "trust": 1.0,
        "url": "http://www.linksys.com/servlet/satellite?blobcol=urldata\u0026blobheadername1=content-type\u0026blobheadername2=content-disposition\u0026blobheadervalue1=application%2fmsword\u0026blobheadervalue2=inline%3b+filename"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4594"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/32259http"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/45842"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/2805"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksys.com/servlet/satellite?c=l_product_c2\u0026childpagename=us%2flayout\u0026cid=1153780863744\u0026pagename=linksys%2fcommon%2fvisitorwrapper\u0026lid=6374487090b05"
      },
      {
        "trust": 0.1,
        "url": "http://www.linksys.com/servlet/satellite?blobcol=urldata\u0026amp;blobheadername1=content-type\u0026amp;blobheadername2=content-disposition\u0026amp;blobheadervalue1=application%2fmsword\u0026amp;blobheadervalue2=inline%3b+filename"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20144/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/binary_analysis/sample_analysis/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/32259/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.linksys.com/servlet/satellite?c=l_download_c2\u0026childpagename=us%2flayout\u0026cid=1115417109974\u0026packedargs=sku%3d1152745215776\u0026pagename=linksys%2fcommon%2fvisitorwrapper"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "db": "BID",
        "id": "56356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "db": "BID",
        "id": "56356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-11-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "date": "2008-10-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "date": "2008-10-17T00:00:00",
        "db": "BID",
        "id": "56356"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "date": "2008-10-15T06:24:30",
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "date": "2008-10-17T20:33:56.067000",
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "date": "2008-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-11-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6230"
      },
      {
        "date": "2017-08-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-34719"
      },
      {
        "date": "2008-10-17T00:00:00",
        "db": "BID",
        "id": "56356"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      },
      {
        "date": "2017-08-08T01:32:46.203000",
        "db": "NVD",
        "id": "CVE-2008-4594"
      },
      {
        "date": "2008-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WAP4400N of  SNMPv3 Component vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004953"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-292"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…