ID

VAR-201711-0630


CVE

CVE-2017-16923


TITLE

plural Shenzhen Tenda Command injection vulnerability in devices

Trust: 0.8

sources: JVNDB: JVNDB-2017-010774

DESCRIPTION

Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the "sub_A6E8 usbeject_process_entry" function executes a system function with untrusted input. Shenzhen Tenda Ac9 , Ac15 ,and Ac18 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ShenzhenTendaAc9 and other are the wireless router products of Tenda. App_data_center is one of the application data centers. There is a command injection vulnerability in app_data_center in several ShenzhenTenda products. The following versions are affected: Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01 Version, Ac9 ac9_kf_V15.03.05.19(6318_)_cn Version, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01 Version, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01 Version, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01 version, Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices version

Trust: 2.25

sources: NVD: CVE-2017-16923 // JVNDB: JVNDB-2017-010774 // CNVD: CNVD-2017-37811 // VULHUB: VHN-107894

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-37811

AFFECTED PRODUCTS

vendor:tendamodel:ac15scope:eqversion:us_ac15v1.0br_v15.03.05.18_multi_td01

Trust: 2.4

vendor:tendamodel:ac15scope:eqversion:us_ac15v1.0br_v15.03.05.19_multi_td01

Trust: 2.4

vendor:tendamodel:ac18scope:eqversion:us_ac18v1.0br_v15.03.05.05_multi_td01

Trust: 2.4

vendor:tendamodel:ac9scope:eqversion:us_ac9v1.0br_v15.03.05.14_multi_td01

Trust: 2.4

vendor:tendamodel:ac9scope:eqversion:ac9_kf_v15.03.05.19\(6318_\)_cn

Trust: 1.6

vendor:tendamodel:ac18scope:eqversion:ac18_kf_v15.03.05.19\(6318_\)_cn

Trust: 1.6

vendor:tendamodel:ac18scope:eqversion:ac18_kf_v15.03.05.19(6318_)_cn

Trust: 0.8

vendor:tendamodel:ac9scope:eqversion:ac9_kf_v15.03.05.19(6318_)_cn

Trust: 0.8

vendor: - model:tenda technology co.,ltd. w15e devicesscope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 us_ac9v1.0br_v15.03.05.14_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 ac9_kf_v15.03.05.19 _cnscope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 ac15 us_ac15v1.0br_v15.03.05.18_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 ac15 us_ac15v1.0br_v15.03.05.19_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 ac18 us_ac18v1.0br_v15.03.05.05_multi_td01scope: - version: -

Trust: 0.6

vendor: - model:tenda technology co.,ltd. ac9 ac18 ac18_kf_v15.03.05.19 _cnscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2017-37811 // JVNDB: JVNDB-2017-010774 // CNNVD: CNNVD-201711-888 // NVD: CVE-2017-16923

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-16923
value: HIGH

Trust: 1.0

NVD: CVE-2017-16923
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-37811
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201711-888
value: HIGH

Trust: 0.6

VULHUB: VHN-107894
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-16923
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-37811
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-107894
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-16923
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-37811 // VULHUB: VHN-107894 // JVNDB: JVNDB-2017-010774 // CNNVD: CNNVD-201711-888 // NVD: CVE-2017-16923

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-107894 // JVNDB: JVNDB-2017-010774 // NVD: CVE-2017-16923

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201711-888

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201711-888

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010774

PATCH

title:Top Pageurl:http://tendacn.com/en/default.html

Trust: 0.8

sources: JVNDB: JVNDB-2017-010774

EXTERNAL IDS

db:NVDid:CVE-2017-16923

Trust: 3.1

db:JVNDBid:JVNDB-2017-010774

Trust: 0.8

db:CNNVDid:CNNVD-201711-888

Trust: 0.7

db:CNVDid:CNVD-2017-37811

Trust: 0.6

db:VULHUBid:VHN-107894

Trust: 0.1

sources: CNVD: CNVD-2017-37811 // VULHUB: VHN-107894 // JVNDB: JVNDB-2017-010774 // CNNVD: CNNVD-201711-888 // NVD: CVE-2017-16923

REFERENCES

url:https://github.com/iolop/poc/tree/master/router/tenda

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-16923

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16923

Trust: 0.8

sources: CNVD: CNVD-2017-37811 // VULHUB: VHN-107894 // JVNDB: JVNDB-2017-010774 // CNNVD: CNNVD-201711-888 // NVD: CVE-2017-16923

SOURCES

db:CNVDid:CNVD-2017-37811
db:VULHUBid:VHN-107894
db:JVNDBid:JVNDB-2017-010774
db:CNNVDid:CNNVD-201711-888
db:NVDid:CVE-2017-16923

LAST UPDATE DATE

2024-11-23T22:45:33.771000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-37811date:2017-12-21T00:00:00
db:VULHUBid:VHN-107894date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-010774date:2017-12-25T00:00:00
db:CNNVDid:CNNVD-201711-888date:2019-10-23T00:00:00
db:NVDid:CVE-2017-16923date:2024-11-21T03:17:14.913

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-37811date:2017-12-21T00:00:00
db:VULHUBid:VHN-107894date:2017-11-21T00:00:00
db:JVNDBid:JVNDB-2017-010774date:2017-12-25T00:00:00
db:CNNVDid:CNNVD-201711-888date:2017-11-24T00:00:00
db:NVDid:CVE-2017-16923date:2017-11-21T14:29:00.260