ID

VAR-201612-0015


CVE

CVE-2016-6277


TITLE

Multiple Netgear routers are vulnerable to arbitrary command injection

Trust: 0.8

sources: CERT/CC: VU#582384

DESCRIPTION

NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. plural NETGEAR Multiple routers have multiple vulnerabilities. Command injection (CWE-77) - CVE-2016-6277 The problem of lack of authentication for important functions (CWE-306) Cross-site request forgery (CWE-352) NETGEAR Multiple routers made by the company contain a command injection vulnerability. In addition, when a user who can access the product accesses a specially crafted page, URL As a result, it may be possible to execute arbitrary commands with administrator privileges of the product. CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') https://cwe.mitre.org/data/definitions/77.html CWE-306: Missing Authentication for Critical Function https://cwe.mitre.org/data/definitions/306.html CWE-352: Cross-Site Request Forgery (CSRF) https://cwe.mitre.org/data/definitions/352.htmlCrafted by a remote third party URL By accessing, an arbitrary command may be executed with the administrator authority of the product concerned. NetgearR7000 and R6400 are Netgear's wireless router products. An attacker exploits a vulnerability to execute arbitrary system commands in the context of an affected application. Netgear R6400 running firmware version 1.0.1.6_1.0.4 and prior. Netgear R8000 running firmware version 1.0.3.4_1.1.2. Security flaws exist in several NETGEAR routing products

Trust: 3.33

sources: NVD: CVE-2016-6277 // CERT/CC: VU#582384 // JVNDB: JVNDB-2016-006166 // CNVD: CNVD-2016-12093 // BID: 94819 // VULHUB: VHN-95097 // VULMON: CVE-2016-6277

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-12093

AFFECTED PRODUCTS

vendor:netgearmodel:d6220scope:lteversion:1.0.0.22

Trust: 1.0

vendor:netgearmodel:r7300dstscope:lteversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:r6700scope:lteversion:1.0.1.14

Trust: 1.0

vendor:netgearmodel:r6250scope:lteversion:1.0.4.6_10.1.12

Trust: 1.0

vendor:netgearmodel:r6900scope:lteversion:1.0.1.14

Trust: 1.0

vendor:netgearmodel:r7100lgscope:lteversion:1.0.0.28

Trust: 1.0

vendor:netgearmodel:r7900scope:lteversion:1.0.1.8

Trust: 1.0

vendor:netgearmodel:r8000scope:lteversion:1.0.3.26

Trust: 1.0

vendor:netgearmodel:r7000scope:lteversion:1.0.7.2_1.1.93

Trust: 1.0

vendor:netgearmodel:r6400scope:lteversion:1.0.1.18

Trust: 1.0

vendor:netgearmodel:d6400scope:lteversion:1.0.0.56

Trust: 1.0

vendor:netgearmodel: - scope: - version: -

Trust: 0.8

vendor:net gearmodel:d6220scope: - version: -

Trust: 0.8

vendor:net gearmodel:d6400scope: - version: -

Trust: 0.8

vendor:net gearmodel:r6250scope: - version: -

Trust: 0.8

vendor:net gearmodel:r6400scope: - version: -

Trust: 0.8

vendor:net gearmodel:r6700scope: - version: -

Trust: 0.8

vendor:net gearmodel:r6900scope: - version: -

Trust: 0.8

vendor:net gearmodel:r7000scope: - version: -

Trust: 0.8

vendor:net gearmodel:r7100lgscope: - version: -

Trust: 0.8

vendor:net gearmodel:r7300dstscope: - version: -

Trust: 0.8

vendor:net gearmodel:r7900scope: - version: -

Trust: 0.8

vendor:net gearmodel:r8000scope: - version: -

Trust: 0.8

vendor:netgearmodel:d6220scope:eqversion:1.0.0.22

Trust: 0.7

vendor:netgearmodel:d6400scope:eqversion:1.0.0.56

Trust: 0.7

vendor:netgearmodel:r6700scope:eqversion:1.0.1.14

Trust: 0.7

vendor:netgearmodel:r6900scope:eqversion:1.0.1.14

Trust: 0.7

vendor:netgearmodel:r7100lgscope:eqversion:1.0.0.28

Trust: 0.7

vendor:netgearmodel:r7300dstscope:eqversion:1.0.0.46

Trust: 0.7

vendor:netgearmodel:r7900scope:eqversion:1.0.1.8

Trust: 0.7

vendor:netgearmodel:r8000scope:eqversion:1.0.3.26

Trust: 0.7

vendor:netgearmodel:r7000scope:gteversion:1.0.7.2,<=1.1.93

Trust: 0.6

vendor:netgearmodel:r6400scope:gteversion:1.0.1.6<=1.0.4

Trust: 0.6

vendor:netgearmodel:r8000scope:gteversion:1.0.3.4,<=1.1.2

Trust: 0.6

vendor:netgearmodel:r7000scope:eqversion:1.0.7.2_1.1.93

Trust: 0.6

vendor:netgearmodel:r6250scope:eqversion:1.0.4.6_10.1.12

Trust: 0.6

vendor:netgearmodel:r8000 1.0.3.4 1.1.2scope: - version: -

Trust: 0.3

vendor:netgearmodel:r7000 1.0.7.2 1.1.93scope: - version: -

Trust: 0.3

vendor:netgearmodel:r6400 1.0.1.6 1.0.4scope: - version: -

Trust: 0.3

vendor:netgearmodel:r6250scope:eqversion:1.0.4.6 10.1.12

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.18

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion:1.0.7.2 1.1.93

Trust: 0.1

sources: CERT/CC: VU#582384 // CNVD: CNVD-2016-12093 // VULMON: CVE-2016-6277 // BID: 94819 // JVNDB: JVNDB-2016-006166 // CNNVD: CNNVD-201612-432 // NVD: CVE-2016-6277

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2016-6277
value: HIGH

Trust: 1.6

nvd@nist.gov: CVE-2016-6277
value: HIGH

Trust: 1.0

CNVD: CNVD-2016-12093
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201612-432
value: CRITICAL

Trust: 0.6

VULHUB: VHN-95097
value: HIGH

Trust: 0.1

VULMON: CVE-2016-6277
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-6277
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

NVD: CVE-2016-6277
severity: HIGH
baseScore: 9.3
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-12093
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-95097
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6277
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2016-6277
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CERT/CC: VU#582384 // CNVD: CNVD-2016-12093 // VULHUB: VHN-95097 // VULMON: CVE-2016-6277 // JVNDB: JVNDB-2016-006166 // CNNVD: CNNVD-201612-432 // NVD: CVE-2016-6277

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

problemtype:CWE-77

Trust: 0.8

problemtype:CWE-306

Trust: 0.8

sources: VULHUB: VHN-95097 // JVNDB: JVNDB-2016-006166 // NVD: CVE-2016-6277

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201612-432

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201612-432

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-006166

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#582384 // VULHUB: VHN-95097 // VULMON: CVE-2016-6277

PATCH

title:Security Advisory for CVE-2016-6277, PSV-2016-0245url:http://kb.netgear.com/000036386/CVE-2016-582384

Trust: 0.8

title:Multiple NETGEAR Remedial measures for routing product cross-site request forgery vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=103230

Trust: 0.6

title:netgear-r7000_command_injection_exploiturl:https://github.com/vpc435/netgear-r7000_command_injection_exploit

Trust: 0.1

title:labsurl:https://github.com/nixawk/labs

Trust: 0.1

title:MS17-010url:https://github.com/oneplus-x/MS17-010

Trust: 0.1

title:Cyber-Security_Collectionurl:https://github.com/RakhithJK/Cyber-Security_Collection

Trust: 0.1

title:awesome-cyber-securityurl:https://github.com/xrkk/awesome-cyber-security

Trust: 0.1

title:Exp101tsArchiv30thersurl:https://github.com/nu11secur1ty/Exp101tsArchiv30thers

Trust: 0.1

title:Windows10ExploitsArchiv30thersurl:https://github.com/nu11secur1ty/Windows10ExploitsArchiv30thers

Trust: 0.1

title:awesome-cve-pocurl:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

title:Threatposturl:https://threatpost.com/wicked-botnet-uses-passel-of-exploits-to-target-iot/132125/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/go-based-liquorbot-adapts-cryptomining-payload-to-infected-host/

Trust: 0.1

sources: VULMON: CVE-2016-6277 // JVNDB: JVNDB-2016-006166 // CNNVD: CNNVD-201612-432

EXTERNAL IDS

db:NVDid:CVE-2016-6277

Trust: 4.3

db:EXPLOIT-DBid:40889

Trust: 4.0

db:CERT/CCid:VU#582384

Trust: 3.7

db:BIDid:94819

Trust: 1.5

db:EXPLOIT-DBid:41598

Trust: 1.2

db:PACKETSTORMid:155712

Trust: 1.2

db:JVNid:JVNVU94858949

Trust: 0.8

db:JVNDBid:JVNDB-2016-006166

Trust: 0.8

db:CNNVDid:CNNVD-201612-432

Trust: 0.7

db:CNVDid:CNVD-2016-12093

Trust: 0.6

db:PACKETSTORMid:141585

Trust: 0.1

db:SEEBUGid:SSVID-92571

Trust: 0.1

db:VULHUBid:VHN-95097

Trust: 0.1

db:VULMONid:CVE-2016-6277

Trust: 0.1

sources: CERT/CC: VU#582384 // CNVD: CNVD-2016-12093 // VULHUB: VHN-95097 // VULMON: CVE-2016-6277 // BID: 94819 // JVNDB: JVNDB-2016-006166 // CNNVD: CNNVD-201612-432 // NVD: CVE-2016-6277

REFERENCES

url:https://www.exploit-db.com/exploits/40889/

Trust: 4.0

url:http://kb.netgear.com/000036386/cve-2016-582384

Trust: 3.7

url:http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/

Trust: 3.4

url:https://kalypto.org/research/netgear-vulnerability-expanded/

Trust: 3.4

url:https://www.kb.cert.org/vuls/id/582384

Trust: 3.0

url:http://www.securityfocus.com/bid/94819

Trust: 1.3

url:https://www.exploit-db.com/exploits/41598/

Trust: 1.3

url:http://packetstormsecurity.com/files/155712/netgear-r6400-remote-code-execution.html

Trust: 1.2

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6277

Trust: 0.8

url:http://jvn.jp/cert/jvnvu94858949

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6277

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/352.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CERT/CC: VU#582384 // CNVD: CNVD-2016-12093 // VULHUB: VHN-95097 // VULMON: CVE-2016-6277 // BID: 94819 // JVNDB: JVNDB-2016-006166 // CNNVD: CNNVD-201612-432 // NVD: CVE-2016-6277

CREDITS

Chad Dougherty

Trust: 0.3

sources: BID: 94819

SOURCES

db:CERT/CCid:VU#582384
db:CNVDid:CNVD-2016-12093
db:VULHUBid:VHN-95097
db:VULMONid:CVE-2016-6277
db:BIDid:94819
db:JVNDBid:JVNDB-2016-006166
db:CNNVDid:CNNVD-201612-432
db:NVDid:CVE-2016-6277

LAST UPDATE DATE

2024-09-09T23:07:10.080000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#582384date:2017-01-03T00:00:00
db:CNVDid:CNVD-2016-12093date:2016-12-12T00:00:00
db:VULHUBid:VHN-95097date:2017-08-16T00:00:00
db:VULMONid:CVE-2016-6277date:2017-08-16T00:00:00
db:BIDid:94819date:2017-01-12T01:04:00
db:JVNDBid:JVNDB-2016-006166date:2016-12-27T00:00:00
db:CNNVDid:CNNVD-201612-432date:2019-11-22T00:00:00
db:NVDid:CVE-2016-6277date:2024-07-16T17:43:58.997

SOURCES RELEASE DATE

db:CERT/CCid:VU#582384date:2016-12-09T00:00:00
db:CNVDid:CNVD-2016-12093date:2016-12-09T00:00:00
db:VULHUBid:VHN-95097date:2016-12-14T00:00:00
db:VULMONid:CVE-2016-6277date:2016-12-14T00:00:00
db:BIDid:94819date:2016-12-09T00:00:00
db:JVNDBid:JVNDB-2016-006166date:2016-12-13T00:00:00
db:CNNVDid:CNNVD-201612-432date:2016-12-15T00:00:00
db:NVDid:CVE-2016-6277date:2016-12-14T16:59:00.350