Lucene search

K
cveMitreCVE-2016-10174
HistoryJan 30, 2017 - 4:59 a.m.

CVE-2016-10174

2017-01-3004:59:00
CWE-120
mitre
web.nvd.nist.gov
841
In Wild
cve-2016-10174
netgear
wnr2000v5
router
buffer overflow
hidden_lang_avi
remote code execution
nvd

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.972

Percentile

99.8%

The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.

Affected configurations

Nvd
Node
netgeard6100_firmwareMatch-
AND
netgeard6100Match-
Node
netgeard7000_firmwareMatch-
AND
netgeard7000Match-
Node
netgeard7800_firmwareMatch-
AND
netgeard7800Match-
Node
netgearjnr1010v2_firmwareMatch-
AND
netgearjnr1010v2Match-
Node
netgearjnr3300_firmwareMatch-
AND
netgearjnr3300Match-
Node
netgearjwnr2010v5_firmwareMatch-
AND
netgearjwnr2010v5Match-
Node
netgearr2000_firmwareMatch-
AND
netgearr2000Match-
Node
netgearr6100_firmwareMatch-
AND
netgearr6100Match-
Node
netgearr6220_firmwareMatch-
AND
netgearr6220Match-
Node
netgearr7500_firmwareMatch-
AND
netgearr7500Match-
Node
netgearr7500v2_firmwareMatch-
AND
netgearr7500v2Match-
Node
netgearwndr3700v4_firmwareMatch-
AND
netgearwndr3700v4Match-
Node
netgearwndr3800_firmwareMatch-
AND
netgearwndr3800Match-
Node
netgearwndr4300_firmwareMatch-
AND
netgearwndr4300Match-
Node
netgearwndr4300v2_firmwareMatch-
AND
netgearwndr4300v2Match-
Node
netgearwndr4500v3_firmwareMatch-
AND
netgearwndr4500v3Match-
Node
netgearwndr4700_firmwareMatch-
AND
netgearwndr4700Match-
Node
netgearwnr1000v2_firmwareMatch-
AND
netgearwnr1000v2Match-
Node
netgearwnr1000v4_firmwareMatch-
AND
netgearwnr1000v4Match-
Node
netgearwnr2000v3_firmwareMatch-
AND
netgearwnr2000v3Match-
Node
netgearwnr2000v4_firmwareMatch-
AND
netgearwnr2000v4Match-
Node
netgearwnr2000v5_firmwareMatch-
AND
netgearwnr2000v5Match-
Node
netgearwnr2020_firmwareMatch-
AND
netgearwnr2020Match-
Node
netgearwnr2050_firmwareMatch-
AND
netgearwnr2050Match-
Node
netgearwnr2200_firmwareMatch-
AND
netgearwnr2200Match-
Node
netgearwnr2500_firmwareMatch-
AND
netgearwnr2500Match-
Node
netgearwnr614_firmwareMatch-
AND
netgearwnr614Match-
Node
netgearwnr618_firmwareMatch-
AND
netgearwnr618Match-
VendorProductVersionCPE
netgeard6100_firmware-cpe:2.3:o:netgear:d6100_firmware:-:*:*:*:*:*:*:*
netgeard6100-cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*
netgeard7000_firmware-cpe:2.3:o:netgear:d7000_firmware:-:*:*:*:*:*:*:*
netgeard7000-cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*
netgeard7800_firmware-cpe:2.3:o:netgear:d7800_firmware:-:*:*:*:*:*:*:*
netgeard7800-cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*
netgearjnr1010v2_firmware-cpe:2.3:o:netgear:jnr1010v2_firmware:-:*:*:*:*:*:*:*
netgearjnr1010v2-cpe:2.3:h:netgear:jnr1010v2:-:*:*:*:*:*:*:*
netgearjnr3300_firmware-cpe:2.3:o:netgear:jnr3300_firmware:-:*:*:*:*:*:*:*
netgearjnr3300-cpe:2.3:h:netgear:jnr3300:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 561

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.972

Percentile

99.8%