ID

VAR-201905-0651


CVE

CVE-2017-18368


TITLE

ZyXEL P660HN-T1A v1 Command injection vulnerability in routers

Trust: 0.8

sources: JVNDB: JVNDB-2017-014439

DESCRIPTION

The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter. ZyXEL P660HN-T1A v1 The router contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZyXEL P660HN-T1A is a wireless router made by ZyXEL, Taiwan, China. An operating system command injection vulnerability exists in ZyXEL P660HN-T1A (hardware v1 and TrueOnline firmware 340ULM0b31). The vulnerability stems from the fact that the network system or product does not correctly filter special characters, commands, etc. in the process of constructing executable commands of the operating system from external input data. Attackers can exploit this vulnerability to execute illegal operating system commands

Trust: 1.8

sources: NVD: CVE-2017-18368 // JVNDB: JVNDB-2017-014439 // VULHUB: VHN-109483 // VULMON: CVE-2017-18368

AFFECTED PRODUCTS

vendor:zyxelmodel:p660hn-t1a v1scope:eqversion:7.3.15.0

Trust: 1.0

vendor:zyxelmodel:p660hn-t1a v2scope:eqversion:7.3.15.0

Trust: 1.0

vendor:billionmodel:5200w-tscope:eqversion:7.3.8.0

Trust: 1.0

vendor:billionmodel:5200w-tscope: - version: -

Trust: 0.8

vendor:zyxelmodel:p660hn-t1a v1scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p660hn-t1a v2scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-014439 // NVD: CVE-2017-18368

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18368
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-18368
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201905-072
value: CRITICAL

Trust: 0.6

VULHUB: VHN-109483
value: HIGH

Trust: 0.1

VULMON: CVE-2017-18368
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-18368
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-109483
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18368
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109483 // VULMON: CVE-2017-18368 // JVNDB: JVNDB-2017-014439 // CNNVD: CNNVD-201905-072 // NVD: CVE-2017-18368

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-109483 // JVNDB: JVNDB-2017-014439 // NVD: CVE-2017-18368

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-072

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201905-072

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014439

PATCH

title:Top Pageurl:http://www.billion.com.tw/index.aspx

Trust: 0.8

title:Top Pageurl:https://www.zyxel.com/homepage.shtml

Trust: 0.8

title:Threatposturl:https://threatpost.com/valve-source-engine-fortnite-servers-crippled-by-gafgyt-variant/149719/

Trust: 0.1

sources: VULMON: CVE-2017-18368 // JVNDB: JVNDB-2017-014439

EXTERNAL IDS

db:NVDid:CVE-2017-18368

Trust: 2.6

db:JVNDBid:JVNDB-2017-014439

Trust: 0.8

db:CNNVDid:CNNVD-201905-072

Trust: 0.7

db:VULHUBid:VHN-109483

Trust: 0.1

db:VULMONid:CVE-2017-18368

Trust: 0.1

sources: VULHUB: VHN-109483 // VULMON: CVE-2017-18368 // JVNDB: JVNDB-2017-014439 // CNNVD: CNNVD-201905-072 // NVD: CVE-2017-18368

REFERENCES

url:https://seclists.org/fulldisclosure/2017/jan/40

Trust: 2.6

url:http://www.zyxel.com/support/announcement_unauthenticated.shtml

Trust: 1.8

url:https://raw.githubusercontent.com/pedrib/poc/master/advisories/zyxel_trueonline.txt

Trust: 1.8

url:https://ssd-disclosure.com/index.php/archives/2910

Trust: 1.8

url:https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-18368

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18368

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/valve-source-engine-fortnite-servers-crippled-by-gafgyt-variant/149719/

Trust: 0.1

sources: VULHUB: VHN-109483 // VULMON: CVE-2017-18368 // JVNDB: JVNDB-2017-014439 // CNNVD: CNNVD-201905-072 // NVD: CVE-2017-18368

SOURCES

db:VULHUBid:VHN-109483
db:VULMONid:CVE-2017-18368
db:JVNDBid:JVNDB-2017-014439
db:CNNVDid:CNNVD-201905-072
db:NVDid:CVE-2017-18368

LAST UPDATE DATE

2024-08-14T15:23:06.350000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109483date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-18368date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-014439date:2019-05-24T00:00:00
db:CNNVDid:CNNVD-201905-072date:2020-05-22T00:00:00
db:NVDid:CVE-2017-18368date:2019-10-03T00:03:26.223

SOURCES RELEASE DATE

db:VULHUBid:VHN-109483date:2019-05-02T00:00:00
db:VULMONid:CVE-2017-18368date:2019-05-02T00:00:00
db:JVNDBid:JVNDB-2017-014439date:2019-05-24T00:00:00
db:CNNVDid:CNNVD-201905-072date:2019-05-02T00:00:00
db:NVDid:CVE-2017-18368date:2019-05-02T17:29:00.287