var-201612-0015
Vulnerability from variot
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. plural NETGEAR Multiple routers have multiple vulnerabilities. Command injection (CWE-77) - CVE-2016-6277 The problem of lack of authentication for important functions (CWE-306) Cross-site request forgery (CWE-352) NETGEAR Multiple routers made by the company contain a command injection vulnerability. In addition, when a user who can access the product accesses a specially crafted page, URL As a result, it may be possible to execute arbitrary commands with administrator privileges of the product. CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') https://cwe.mitre.org/data/definitions/77.html CWE-306: Missing Authentication for Critical Function https://cwe.mitre.org/data/definitions/306.html CWE-352: Cross-Site Request Forgery (CSRF) https://cwe.mitre.org/data/definitions/352.htmlCrafted by a remote third party URL By accessing, an arbitrary command may be executed with the administrator authority of the product concerned. NetgearR7000 and R6400 are Netgear's wireless router products. An attacker exploits a vulnerability to execute arbitrary system commands in the context of an affected application. The following routers are vulnerable: Netgear R7000 running firmware version 1.0.7.2_1.1.93 and prior. Netgear R6400 running firmware version 1.0.1.6_1.0.4 and prior. Netgear R8000 running firmware version 1.0.3.4_1.1.2. Security flaws exist in several NETGEAR routing products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201612-0015", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "r7000", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.7.2_1.1.93" }, { "model": "r6900", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.1.14" }, { "model": "r7100lg", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.0.28" }, { "model": "r6400", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.1.18" }, { "model": "r7300dst", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.0.46" }, { "model": "r8000", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.3.26" }, { "model": "r6700", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.1.14" }, { "model": "r6250", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.4.6_10.1.12" }, { "model": "d6400", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.0.56" }, { "model": "r7900", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.1.8" }, { "model": "d6220", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "1.0.0.22" }, { "model": "d6220", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "d6400", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r6250", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r6400", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r6700", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r6900", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r7000", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r7100lg", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r7300dst", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r7900", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "r8000", "scope": null, "trust": 0.8, "vendor": "net gear", "version": null }, { "model": "d6220", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.0.22" }, { "model": "d6400", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.0.56" }, { "model": "r6700", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.1.14" }, { "model": "r6900", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.1.14" }, { "model": "r7100lg", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.0.28" }, { "model": "r7300dst", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.0.46" }, { "model": "r7900", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.1.8" }, { "model": "r8000", "scope": "eq", "trust": 0.7, "vendor": "netgear", "version": "1.0.3.26" }, { "model": "r7000", "scope": "gte", "trust": 0.6, "vendor": "netgear", "version": "1.0.7.2,\u003c=1.1.93" }, { "model": "r6400", "scope": "gte", "trust": 0.6, "vendor": "netgear", "version": "1.0.1.6\u003c=1.0.4" }, { "model": "r8000", "scope": "gte", "trust": 0.6, "vendor": "netgear", "version": "1.0.3.4,\u003c=1.1.2" }, { "model": "r7000", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "1.0.7.2_1.1.93" }, { "model": "r6250", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "1.0.4.6_10.1.12" }, { "model": "r8000 1.0.3.4 1.1.2", "scope": null, "trust": 0.3, "vendor": "netgear", "version": null }, { "model": "r7000 1.0.7.2 1.1.93", "scope": null, "trust": 0.3, "vendor": "netgear", "version": null }, { "model": "r6400 1.0.1.6 1.0.4", "scope": null, "trust": 0.3, "vendor": "netgear", "version": null }, { "model": "r6250", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.0.4.6 10.1.12" }, { "model": "r6400", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.0.1.18" }, { "model": "r7000", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.0.7.2 1.1.93" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "VULMON", "id": "CVE-2016-6277" }, { "db": "BID", "id": "94819" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNNVD", "id": "CNNVD-201612-432" }, { "db": "NVD", "id": "CVE-2016-6277" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1.18", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.3.26", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.7.2_1.1.93", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0.28", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1.14", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1.14", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0.56", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.4.6_10.1.12", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0.46", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6277" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Chad Dougherty", "sources": [ { "db": "BID", "id": "94819" } ], "trust": 0.3 }, "cve": "CVE-2016-6277", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-6277", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-12093", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-95097", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6277", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6277", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-12093", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-432", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-95097", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-6277", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "VULHUB", "id": "VHN-95097" }, { "db": "VULMON", "id": "CVE-2016-6277" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNNVD", "id": "CNNVD-201612-432" }, { "db": "NVD", "id": "CVE-2016-6277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. plural NETGEAR Multiple routers have multiple vulnerabilities. Command injection (CWE-77) - CVE-2016-6277 The problem of lack of authentication for important functions (CWE-306) Cross-site request forgery (CWE-352) NETGEAR Multiple routers made by the company contain a command injection vulnerability. In addition, when a user who can access the product accesses a specially crafted page, URL As a result, it may be possible to execute arbitrary commands with administrator privileges of the product. CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) https://cwe.mitre.org/data/definitions/77.html CWE-306: Missing Authentication for Critical Function https://cwe.mitre.org/data/definitions/306.html CWE-352: Cross-Site Request Forgery (CSRF) https://cwe.mitre.org/data/definitions/352.htmlCrafted by a remote third party URL By accessing, an arbitrary command may be executed with the administrator authority of the product concerned. NetgearR7000 and R6400 are Netgear\u0027s wireless router products. An attacker exploits a vulnerability to execute arbitrary system commands in the context of an affected application. \nThe following routers are vulnerable:\nNetgear R7000 running firmware version 1.0.7.2_1.1.93 and prior. \nNetgear R6400 running firmware version 1.0.1.6_1.0.4 and prior. \nNetgear R8000 running firmware version 1.0.3.4_1.1.2. Security flaws exist in several NETGEAR routing products", "sources": [ { "db": "NVD", "id": "CVE-2016-6277" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "BID", "id": "94819" }, { "db": "VULHUB", "id": "VHN-95097" }, { "db": "VULMON", "id": "CVE-2016-6277" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=41598", "trust": 0.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-95097", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-95097" }, { "db": "VULMON", "id": "CVE-2016-6277" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6277", "trust": 3.5 }, { "db": "EXPLOIT-DB", "id": "40889", "trust": 3.2 }, { "db": "CERT/CC", "id": "VU#582384", "trust": 2.9 }, { "db": "BID", "id": "94819", "trust": 1.5 }, { "db": "EXPLOIT-DB", "id": "41598", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "155712", "trust": 1.2 }, { "db": "JVN", "id": "JVNVU94858949", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-006166", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-432", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-12093", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "141585", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-92571", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-95097", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-6277", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "VULHUB", "id": "VHN-95097" }, { "db": "VULMON", "id": "CVE-2016-6277" }, { "db": "BID", "id": "94819" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNNVD", "id": "CNNVD-201612-432" }, { "db": "NVD", "id": "CVE-2016-6277" } ] }, "id": "VAR-201612-0015", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "VULHUB", "id": "VHN-95097" } ], "trust": 1.2192528566666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12093" } ] }, "last_update_date": "2024-04-19T22:52:23.057000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for CVE-2016-6277, PSV-2016-0245", "trust": 0.8, "url": "http://kb.netgear.com/000036386/cve-2016-582384" }, { "title": "Multiple NETGEAR Remedial measures for routing product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=103230" }, { "title": "netgear-r7000_command_injection_exploit", "trust": 0.1, "url": "https://github.com/vpc435/netgear-r7000_command_injection_exploit " }, { "title": "labs", "trust": 0.1, "url": "https://github.com/nixawk/labs " }, { "title": "MS17-010", "trust": 0.1, "url": "https://github.com/oneplus-x/ms17-010 " }, { "title": "Cyber-Security_Collection", "trust": 0.1, "url": "https://github.com/rakhithjk/cyber-security_collection " }, { "title": "awesome-cyber-security", "trust": 0.1, "url": "https://github.com/xrkk/awesome-cyber-security " }, { "title": "Exp101tsArchiv30thers", "trust": 0.1, "url": "https://github.com/nu11secur1ty/exp101tsarchiv30thers " }, { "title": "Windows10ExploitsArchiv30thers", "trust": 0.1, "url": "https://github.com/nu11secur1ty/windows10exploitsarchiv30thers " }, { "title": "awesome-cve-poc", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/wicked-botnet-uses-passel-of-exploits-to-target-iot/132125/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/go-based-liquorbot-adapts-cryptomining-payload-to-infected-host/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-6277" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNNVD", "id": "CNNVD-201612-432" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 }, { "problemtype": "CWE-77", "trust": 0.8 }, { "problemtype": "CWE-306", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95097" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "NVD", "id": "CVE-2016-6277" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.exploit-db.com/exploits/40889/" }, { "trust": 3.0, "url": "https://www.kb.cert.org/vuls/id/582384" }, { "trust": 2.6, "url": "http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/" }, { "trust": 2.6, "url": "https://kalypto.org/research/netgear-vulnerability-expanded/" }, { "trust": 2.1, "url": "http://kb.netgear.com/000036386/cve-2016-582384" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/94819" }, { "trust": 1.3, "url": "https://www.exploit-db.com/exploits/41598/" }, { "trust": 1.2, "url": "http://packetstormsecurity.com/files/155712/netgear-r6400-remote-code-execution.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6277" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu94858949" }, { "trust": 0.8, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6277" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "VULHUB", "id": "VHN-95097" }, { "db": "VULMON", "id": "CVE-2016-6277" }, { "db": "BID", "id": "94819" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNNVD", "id": "CNNVD-201612-432" }, { "db": "NVD", "id": "CVE-2016-6277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-12093" }, { "db": "VULHUB", "id": "VHN-95097" }, { "db": "VULMON", "id": "CVE-2016-6277" }, { "db": "BID", "id": "94819" }, { "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "db": "CNNVD", "id": "CNNVD-201612-432" }, { "db": "NVD", "id": "CVE-2016-6277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-09T00:00:00", "db": "CNVD", "id": "CNVD-2016-12093" }, { "date": "2016-12-14T00:00:00", "db": "VULHUB", "id": "VHN-95097" }, { "date": "2016-12-14T00:00:00", "db": "VULMON", "id": "CVE-2016-6277" }, { "date": "2016-12-09T00:00:00", "db": "BID", "id": "94819" }, { "date": "2016-12-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "date": "2016-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-432" }, { "date": "2016-12-14T16:59:00.350000", "db": "NVD", "id": "CVE-2016-6277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-12T00:00:00", "db": "CNVD", "id": "CNVD-2016-12093" }, { "date": "2017-08-16T00:00:00", "db": "VULHUB", "id": "VHN-95097" }, { "date": "2017-08-16T00:00:00", "db": "VULMON", "id": "CVE-2016-6277" }, { "date": "2017-01-12T01:04:00", "db": "BID", "id": "94819" }, { "date": "2016-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006166" }, { "date": "2019-11-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-432" }, { "date": "2017-08-16T01:29:10.057000", "db": "NVD", "id": "CVE-2016-6277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-432" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006166" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-432" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.