ID

VAR-200605-0267


CVE

CVE-2006-2561


TITLE

Edimax BR-6104K Router UPnP Request Access Control Bypass Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2006-3381

DESCRIPTION

Edimax BR-6104K router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter (possibly within NewInternalClient), which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. Br 6104K is prone to a security bypass vulnerability. TITLE: Edimax BR-6104K UPnP Shell Command Injection Vulnerability SECUNIA ADVISORY ID: SA20169 VERIFY ADVISORY: http://secunia.com/advisories/20169/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network OPERATING SYSTEM: EDIMAX BR-6104K Broadband Router http://secunia.com/product/10080/ DESCRIPTION: Armijn Hemel has reported a vulnerability in Edimax BR-6104K, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable device. The vulnerability is caused due to missing authentication of UPnP AddPortMapping requests and missing validation of the NewInternalClient parameter of the request. This can be exploited by hosts on the local network to execute shell commands e.g. "/sbin/reboot" on the device via specially crafted UPnP AddPortMapping requests containing shell commands in the NewInternalClient parameter. SOLUTION: Disable the UPnP functionality if it is not required. UPnP is reportedly disabled by default. PROVIDED AND/OR DISCOVERED BY: Armijn Hemel ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.8

sources: NVD: CVE-2006-2561 // CNVD: CNVD-2006-3381 // BID: 87590 // PACKETSTORM: 46561

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2006-3381

AFFECTED PRODUCTS

vendor:edimaxmodel:br 6104kscope:eqversion:*

Trust: 1.0

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:edimaxmodel:br 6104kscope: - version: -

Trust: 0.6

vendor:edimaxmodel:br 6104kscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2006-3381 // BID: 87590 // CNNVD: CNNVD-200605-436 // NVD: CVE-2006-2561

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2561
value: HIGH

Trust: 1.0

CNVD: CNVD-2006-3381
value: HIGH

Trust: 0.6

CNNVD: CNNVD-200605-436
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2006-2561
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2006-3381
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2006-3381 // CNNVD: CNNVD-200605-436 // NVD: CVE-2006-2561

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2561

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200605-436

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200605-436

EXTERNAL IDS

db:NVDid:CVE-2006-2561

Trust: 2.5

db:SECUNIAid:20169

Trust: 2.3

db:VUPENid:ADV-2006-1911

Trust: 1.6

db:XFid:26709

Trust: 0.9

db:CNVDid:CNVD-2006-3381

Trust: 0.6

db:CNNVDid:CNNVD-200605-436

Trust: 0.6

db:BIDid:87590

Trust: 0.3

db:PACKETSTORMid:46561

Trust: 0.1

sources: CNVD: CNVD-2006-3381 // BID: 87590 // PACKETSTORM: 46561 // CNNVD: CNNVD-200605-436 // NVD: CVE-2006-2561

REFERENCES

url:http://secunia.com/advisories/20169

Trust: 2.2

url:http://www.securityview.org/how-does-the-upnp-flaw-works.html

Trust: 1.9

url:http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html

Trust: 1.9

url:http://www.vupen.com/english/advisories/2006/1911

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26709

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/26709

Trust: 0.9

url:http://www.frsirt.com/english/advisories/2006/1911

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/20169/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/10080/

Trust: 0.1

sources: CNVD: CNVD-2006-3381 // BID: 87590 // PACKETSTORM: 46561 // CNNVD: CNNVD-200605-436 // NVD: CVE-2006-2561

CREDITS

Unknown

Trust: 0.3

sources: BID: 87590

SOURCES

db:CNVDid:CNVD-2006-3381
db:BIDid:87590
db:PACKETSTORMid:46561
db:CNNVDid:CNNVD-200605-436
db:NVDid:CVE-2006-2561

LAST UPDATE DATE

2024-08-14T15:31:03.518000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2006-3381date:2006-05-23T00:00:00
db:BIDid:87590date:2006-05-23T00:00:00
db:CNNVDid:CNNVD-200605-436date:2006-05-24T00:00:00
db:NVDid:CVE-2006-2561date:2024-02-14T01:17:43.863

SOURCES RELEASE DATE

db:CNVDid:CNVD-2006-3381date:2006-05-23T00:00:00
db:BIDid:87590date:2006-05-23T00:00:00
db:PACKETSTORMid:46561date:2006-05-23T05:09:34
db:CNNVDid:CNNVD-200605-436date:2006-05-23T00:00:00
db:NVDid:CVE-2006-2561date:2006-05-24T01:02:00