ID

VAR-201711-0574


CVE

CVE-2017-16936


TITLE

plural Shenzhen Tenda Path traversal vulnerability in devices

Trust: 0.8

sources: JVNDB: JVNDB-2017-010756

DESCRIPTION

Directory Traversal vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to read arbitrary files via a cgi-bin/luci/request?op=1&path= URI that uses directory traversal sequences after a /usb/ substring. Shenzhen Tenda Ac9 , Ac15 ,and Ac18 The device contains a path traversal vulnerability.Information may be obtained. ShenzhenTendaAc9 and other are the wireless router products of Tenda. App_data_center is one of the application data centers. A directory traversal vulnerability exists in app_data_center in several ShenzhenTenda products. A remote attacker can exploit this vulnerability to read arbitrary files. The following products and versions are affected: Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01 Version, Ac9 ac9_kf_V15.03.05.19(6318_)_cn Version, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01 Version, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01 Version , Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01 version, Ac18 ac18_kf_V15.03.05.19(6318_)_cn version

Trust: 2.25

sources: NVD: CVE-2017-16936 // JVNDB: JVNDB-2017-010756 // CNVD: CNVD-2017-35381 // VULHUB: VHN-107908

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-35381

AFFECTED PRODUCTS

vendor:tendamodel:ac15scope:eqversion:us_ac15v1.0br_v15.03.05.18_multi_td01

Trust: 2.4

vendor:tendamodel:ac15scope:eqversion:us_ac15v1.0br_v15.03.05.19_multi_td01

Trust: 2.4

vendor:tendamodel:ac18scope:eqversion:us_ac18v1.0br_v15.03.05.05_multi_td01

Trust: 2.4

vendor:tendamodel:ac9scope:eqversion:us_ac9v1.0br_v15.03.05.14_multi_td01

Trust: 2.4

vendor:tendamodel:ac9scope:eqversion:ac9_kf_v15.03.05.19\(6318_\)_cn

Trust: 1.6

vendor:tendamodel:ac18scope:eqversion:ac18_kf_v15.03.05.19\(6318_\)_cn

Trust: 1.6

vendor:tendamodel:ac18scope:eqversion:ac18_kf_v15.03.05.19(6318_)_cn

Trust: 0.8

vendor:tendamodel:ac9scope:eqversion:ac9_kf_v15.03.05.19(6318_)_cn

Trust: 0.8

vendor: - model:tenda technology co.,ltd. ac9 us_ac9v1.0br_v15.03.05.14_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 ac9_kf_v15.03.05.19 _cnscope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac15 us_ac15v1.0br_v15.03.05.18_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac15 us_ac15v1.0br_v15.03.05.19_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac18 us_ac18v1.0br_v15.03.05.05_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac18 ac18 ac18_kf_v15.03.05.19 _cnscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2017-35381 // JVNDB: JVNDB-2017-010756 // CNNVD: CNNVD-201711-1055 // NVD: CVE-2017-16936

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-16936
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-16936
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-35381
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201711-1055
value: LOW

Trust: 0.6

VULHUB: VHN-107908
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-16936
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-35381
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-107908
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-16936
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-35381 // VULHUB: VHN-107908 // JVNDB: JVNDB-2017-010756 // CNNVD: CNNVD-201711-1055 // NVD: CVE-2017-16936

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-107908 // JVNDB: JVNDB-2017-010756 // NVD: CVE-2017-16936

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201711-1055

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201711-1055

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010756

PATCH

title:Top Pageurl:http://tendacn.com/en/default.html

Trust: 0.8

sources: JVNDB: JVNDB-2017-010756

EXTERNAL IDS

db:NVDid:CVE-2017-16936

Trust: 3.1

db:JVNDBid:JVNDB-2017-010756

Trust: 0.8

db:CNNVDid:CNNVD-201711-1055

Trust: 0.7

db:CNVDid:CNVD-2017-35381

Trust: 0.6

db:VULHUBid:VHN-107908

Trust: 0.1

sources: CNVD: CNVD-2017-35381 // VULHUB: VHN-107908 // JVNDB: JVNDB-2017-010756 // CNNVD: CNNVD-201711-1055 // NVD: CVE-2017-16936

REFERENCES

url:https://github.com/iolop/poc/tree/master/router/tenda

Trust: 3.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16936

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-16936

Trust: 0.8

sources: CNVD: CNVD-2017-35381 // VULHUB: VHN-107908 // JVNDB: JVNDB-2017-010756 // CNNVD: CNNVD-201711-1055 // NVD: CVE-2017-16936

SOURCES

db:CNVDid:CNVD-2017-35381
db:VULHUBid:VHN-107908
db:JVNDBid:JVNDB-2017-010756
db:CNNVDid:CNNVD-201711-1055
db:NVDid:CVE-2017-16936

LAST UPDATE DATE

2024-11-23T22:12:47.863000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-35381date:2017-11-29T00:00:00
db:VULHUBid:VHN-107908date:2017-12-12T00:00:00
db:JVNDBid:JVNDB-2017-010756date:2017-12-22T00:00:00
db:CNNVDid:CNNVD-201711-1055date:2017-11-27T00:00:00
db:NVDid:CVE-2017-16936date:2024-11-21T03:17:16.710

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-35381date:2017-11-29T00:00:00
db:VULHUBid:VHN-107908date:2017-11-24T00:00:00
db:JVNDBid:JVNDB-2017-010756date:2017-12-22T00:00:00
db:CNNVDid:CNNVD-201711-1055date:2017-11-27T00:00:00
db:NVDid:CVE-2017-16936date:2017-11-24T07:29:00.350