var-201704-0303
Vulnerability from variot
(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands. Netgear is the world's leading enterprise network solution and advocate for digital home networking applications. There are authentication bypass vulnerabilities in Netgear's various devices. Attackers exploit vulnerabilities to directly pass input command lines on unverified web pages and initiate command injection attacks. Security vulnerabilities exist in multiple files in several Netgear products. The following products and versions are affected: Netgear WN604 prior to 3.3.3; WN802Tv2 prior to 3.5.5.0; WNAP210v2 prior to 3.5.5.0; WNAP320 prior to 3.5.5.0; WNDAP350 prior to 3.5.5.0; WNDAP360 prior to 3.5 Versions prior to .5.0; versions prior to WNDAP660 3.5.5.0. Hello,
We’d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at https://github.com/firmadyne/firmadyne. This has been assigned CVE-2016-1555. Affected devices include:
Netgear WN604 Netgear WN802Tv2 Netgear WNAP210 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360
Several D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the 'dlink_uid' cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include:
D-Link DAP-2310 D-Link DAP-2330 D-Link DAP-2360 D-Link DAP-2553 D-Link DAP-2660 D-Link DAP-2690 D-Link DAP-2695
Several Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. Affected devices include:
Netgear WN604 Netgear WNAP210 Netgear WNAP320 Netgear WND930 Netgear WNDAP350 Netgear WNDAP360
Several devices by both D-Link and Netgear disclose wireless passwords and administrative usernames/passwords over SNMP, including OID’s iso.3.6.1.4.1.171.10.37.35.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.38.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.35.4.1.1.1, iso.3.6.1.4.1.171.10.37.37.4.1.1.1, iso.3.6.1.4.1.171.10.37.38.4.1.1.1, iso.3.6.1.4.1.4526.100.7.8.1.5, iso.3.6.1.4.1.4526.100.7.9.1.5, iso.3.6.1.4.1.4526.100.7.9.1.7, and iso.3.6.1.4.1.4526.100.7.10.1.7. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include:
D-Link DAP-1353 D-Link DAP-2553 D-Link DAP-3520 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360
We have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March.
Thanks,
Dominic
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0303", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap210v2", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn802tv2", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap360", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.3.2" }, { "model": "wnap320", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap660", "scope": "lte", "trust": 1.0, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.3.3" }, { "model": "wn802tv2", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wnap320", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap350", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap360", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wndap660", "scope": "lt", "trust": 0.8, "vendor": "net gear", "version": "3.5.5.0" }, { "model": "wn604", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn802tv2", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnap210", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnap320", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap350", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndap360", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn604", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.3.2" }, { "model": "wndap210v2", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wn802tv2", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "3.0.5.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wndap210v2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wndap210v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.3.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netgear:wn802tv2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.0.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netgear:wn802tv2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-1555" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dominic Chen", "sources": [ { "db": "PACKETSTORM", "id": "135956" } ], "trust": 0.1 }, "cve": "CVE-2016-1555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-1555", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-01687", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-90374", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-1555", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-1555", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2016-01687", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201604-397", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-90374", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-1555", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands. Netgear is the world\u0027s leading enterprise network solution and advocate for digital home networking applications. There are authentication bypass vulnerabilities in Netgear\u0027s various devices. Attackers exploit vulnerabilities to directly pass input command lines on unverified web pages and initiate command injection attacks. Security vulnerabilities exist in multiple files in several Netgear products. The following products and versions are affected: Netgear WN604 prior to 3.3.3; WN802Tv2 prior to 3.5.5.0; WNAP210v2 prior to 3.5.5.0; WNAP320 prior to 3.5.5.0; WNDAP350 prior to 3.5.5.0; WNDAP360 prior to 3.5 Versions prior to .5.0; versions prior to WNDAP660 3.5.5.0. Hello,\n\nWe\u2019d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at https://github.com/firmadyne/firmadyne. This has been assigned CVE-2016-1555. Affected devices include:\n\nNetgear WN604\nNetgear WN802Tv2\nNetgear WNAP210\nNetgear WNAP320\nNetgear WNDAP350\nNetgear WNDAP360\n\nSeveral D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the \u0027dlink_uid\u0027 cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include:\n\nD-Link DAP-2310\nD-Link DAP-2330\nD-Link DAP-2360\nD-Link DAP-2553\nD-Link DAP-2660\nD-Link DAP-2690\nD-Link DAP-2695\n\nSeveral Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. Affected devices include:\n\nNetgear WN604\nNetgear WNAP210\nNetgear WNAP320\nNetgear WND930\nNetgear WNDAP350\nNetgear WNDAP360\n\nSeveral devices by both D-Link and Netgear disclose wireless passwords and administrative usernames/passwords over SNMP, including OID\u2019s iso.3.6.1.4.1.171.10.37.35.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.38.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.35.4.1.1.1, iso.3.6.1.4.1.171.10.37.37.4.1.1.1, iso.3.6.1.4.1.171.10.37.38.4.1.1.1, iso.3.6.1.4.1.4526.100.7.8.1.5, iso.3.6.1.4.1.4526.100.7.9.1.5, iso.3.6.1.4.1.4526.100.7.9.1.7, and iso.3.6.1.4.1.4526.100.7.10.1.7. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include:\n\nD-Link DAP-1353\nD-Link DAP-2553\nD-Link DAP-3520\nNetgear WNAP320\nNetgear WNDAP350\nNetgear WNDAP360\n\nWe have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March. \n\nThanks,\n\nDominic\n", "sources": [ { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "PACKETSTORM", "id": "135956" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-90374", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-90374" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1555", "trust": 3.3 }, { "db": "PACKETSTORM", "id": "135956", "trust": 2.7 }, { "db": "EXPLOIT-DB", "id": "45909", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2016-008523", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201604-397", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-01687", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "150478", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-90374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-1555", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "id": "VAR-201704-0303", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" } ], "trust": 1.2278612025 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" } ] }, "last_update_date": "2023-12-18T12:37:29.602000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2016-1555 - Notification", "trust": 0.8, "url": "https://kb.netgear.com/30480/cve-2016-1555-notification" }, { "title": "Multiple Netgear Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91631" }, { "title": "faisalfs10x", "trust": 0.1, "url": "https://github.com/faisalfs10x/faisalfs10x " } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90374" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "NVD", "id": "CVE-2016-1555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://packetstormsecurity.com/files/135956/d-link-netgear-firmadyne-command-injection-buffer-overflow.html" }, { "trust": 2.4, "url": "http://seclists.org/fulldisclosure/2016/feb/112" }, { "trust": 1.8, "url": "https://kb.netgear.com/30480/cve-2016-1555-notification?cid=wmt_netgear_organic" }, { "trust": 1.8, "url": "https://www.exploit-db.com/exploits/45909/" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1555" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1555" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/77.html" }, { "trust": 0.1, "url": "https://github.com/faisalfs10x/faisalfs10x" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/linux/http/netgear_unauth_exec" }, { "trust": 0.1, "url": "https://github.com/firmadyne/firmadyne." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1557" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1558" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01687" }, { "db": "VULHUB", "id": "VHN-90374" }, { "db": "VULMON", "id": "CVE-2016-1555" }, { "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "db": "PACKETSTORM", "id": "135956" }, { "db": "NVD", "id": "CVE-2016-1555" }, { "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01687" }, { "date": "2017-04-21T00:00:00", "db": "VULHUB", "id": "VHN-90374" }, { "date": "2017-04-21T00:00:00", "db": "VULMON", "id": "CVE-2016-1555" }, { "date": "2017-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "date": "2016-02-26T17:22:22", "db": "PACKETSTORM", "id": "135956" }, { "date": "2017-04-21T15:59:00.333000", "db": "NVD", "id": "CVE-2016-1555" }, { "date": "2016-03-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-16T00:00:00", "db": "CNVD", "id": "CNVD-2016-01687" }, { "date": "2019-04-16T00:00:00", "db": "VULHUB", "id": "VHN-90374" }, { "date": "2019-04-16T00:00:00", "db": "VULMON", "id": "CVE-2016-1555" }, { "date": "2017-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008523" }, { "date": "2019-04-16T18:00:19.893000", "db": "NVD", "id": "CVE-2016-1555" }, { "date": "2019-04-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Netgear Vulnerability to execute arbitrary commands in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008523" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-397" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.