TROYANOSYVIRUS
Voltar para CVEs

CVE-2016-10174

CRITICALCISA KEV
9.8

Descricao

The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/30/2017
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorNETGEAR
ProdutoWNR2000v5 Router
Nome da vulnerabilidadeNETGEAR WNR2000v5 Router Buffer Overflow Vulnerability
Data inclusao KEV2022-03-25
Prazo de remediacao2022-04-15
Uso em ransomwareUnknown

Produtos afetados

netgear:d6100netgear:d6100_firmwarenetgear:d7000netgear:d7000_firmwarenetgear:d7800netgear:d7800_firmwarenetgear:jnr1010v2netgear:jnr1010v2_firmwarenetgear:jnr3300netgear:jnr3300_firmwarenetgear:jwnr2010v5netgear:jwnr2010v5_firmwarenetgear:r2000netgear:r2000_firmwarenetgear:r6100netgear:r6100_firmwarenetgear:r6220netgear:r6220_firmwarenetgear:r7500netgear:r7500_firmwarenetgear:r7500v2netgear:r7500v2_firmwarenetgear:wndr3700v4netgear:wndr3700v4_firmwarenetgear:wndr3800netgear:wndr3800_firmwarenetgear:wndr4300netgear:wndr4300_firmwarenetgear:wndr4300v2netgear:wndr4300v2_firmwarenetgear:wndr4500v3netgear:wndr4500v3_firmwarenetgear:wndr4700netgear:wndr4700_firmwarenetgear:wnr1000v2netgear:wnr1000v2_firmwarenetgear:wnr1000v4netgear:wnr1000v4_firmwarenetgear:wnr2000v3netgear:wnr2000v3_firmwarenetgear:wnr2000v4netgear:wnr2000v4_firmwarenetgear:wnr2000v5netgear:wnr2000v5_firmwarenetgear:wnr2020netgear:wnr2020_firmwarenetgear:wnr2050netgear:wnr2050_firmwarenetgear:wnr2200netgear:wnr2200_firmwarenetgear:wnr2500netgear:wnr2500_firmwarenetgear:wnr614netgear:wnr614_firmwarenetgear:wnr618netgear:wnr618_firmware

Fraquezas (CWE)

CWE-120CWE-120

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.