ID

VAR-202005-0732


CVE

CVE-2017-18866


TITLE

plural NETGEAR Cross-site scripting vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2017-015010

DESCRIPTION

Certain NETGEAR devices are affected by stored XSS. This affects R9000 before 1.0.2.40, R6100 before 1.0.1.1, 6R7500 before 1.0.0.110, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, WNDR4300v2 before 1.0.0.48, and WNR2000v5 before 1.0.0.58. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and tampered with. NETGEAR R9000, R7800, R7500, etc. are all wireless routers from NETGEAR. The vulnerability stems from the lack of correct verification of client data in WEB applications. An attacker can use this vulnerability to execute client code. This affects R9000 prior to 1.0.2.40, R6100 prior to 1.0.1.1, 6R7500 prior to 1.0.0.110, R7500v2 prior to 1.0.3.20, R7800 prior to 1.0.2.36, WNDR4300v2 prior to 1.0.0.48, and WNR2000v5 prior to 1.0.0.58

Trust: 2.25

sources: NVD: CVE-2017-18866 // JVNDB: JVNDB-2017-015010 // CNVD: CNVD-2021-28035 // VULMON: CVE-2017-18866

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-28035

AFFECTED PRODUCTS

vendor:netgearmodel:r7800scope:ltversion:1.0.2.36

Trust: 1.6

vendor:netgearmodel:r9000scope:ltversion:1.0.2.40

Trust: 1.6

vendor:netgearmodel:6r7500scope:ltversion:1.0.0.110

Trust: 1.6

vendor:netgearmodel:r6100scope:ltversion:1.0.1.1

Trust: 1.6

vendor:netgearmodel:r7500scope:ltversion:1.0.3.20

Trust: 1.6

vendor:netgearmodel:wndr4300scope:ltversion:1.0.0.48

Trust: 1.6

vendor:netgearmodel:wnr2000scope:ltversion:1.0.0.58

Trust: 1.6

vendor:netgearmodel:6r7500scope:eqversion:1.0.0.110

Trust: 0.8

vendor:netgearmodel:r6100scope:eqversion:1.0.1.1

Trust: 0.8

vendor:netgearmodel:r7500scope:eqversion:1.0.3.20

Trust: 0.8

vendor:netgearmodel:r7800scope:eqversion:1.0.3.20

Trust: 0.8

vendor:netgearmodel:r9000scope:eqversion:1.0.2.40

Trust: 0.8

vendor:netgearmodel:wndr4300scope:eqversion:1.0.0.48

Trust: 0.8

vendor:netgearmodel:wnr2000scope:eqversion:1.0.0.58.

Trust: 0.8

vendor:netgearmodel:wnr2000v5scope: - version: -

Trust: 0.6

vendor:netgearmodel:r7800scope:ltversion:1.0.2.40

Trust: 0.6

vendor:netgearmodel:r7500v2scope: - version: -

Trust: 0.6

vendor:netgearmodel:wndr4300v2scope: - version: -

Trust: 0.6

vendor:netgearmodel:r7500scope:eqversion:1.0.0.108

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.110

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.112

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.116

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.118

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.122

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.124

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.130

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.3.10

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.3.16

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.16

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.28

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.30

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.32

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.2.4

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.2.30

Trust: 0.1

vendor:netgearmodel:wnr2000scope:eqversion:1.0.0.42

Trust: 0.1

vendor:netgearmodel:wnr2000scope:eqversion:1.0.0.48

Trust: 0.1

sources: CNVD: CNVD-2021-28035 // VULMON: CVE-2017-18866 // JVNDB: JVNDB-2017-015010 // NVD: CVE-2017-18866

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18866
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2017-18866
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2017-015010
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-28035
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202005-115
value: MEDIUM

Trust: 0.6

VULMON: CVE-2017-18866
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-18866
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2017-015010
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-28035
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-18866
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2017-18866
baseSeverity: MEDIUM
baseScore: 5.2
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 2.7
version: 3.0

Trust: 1.0

NVD: JVNDB-2017-015010
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-28035 // VULMON: CVE-2017-18866 // JVNDB: JVNDB-2017-015010 // CNNVD: CNNVD-202005-115 // NVD: CVE-2017-18866 // NVD: CVE-2017-18866

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2017-015010 // NVD: CVE-2017-18866

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202005-115

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202005-115

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-015010

PATCH

title:Security Advisory for Stored Cross Site Scripting on Routers, PSV-2016-0100url:https://kb.netgear.com/000051472/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Routers-PSV-2016-0100

Trust: 0.8

title:Patch for Cross-site scripting vulnerabilities in multiple NETGEAR products (CNVD-2021-28035)url:https://www.cnvd.org.cn/patchInfo/show/257996

Trust: 0.6

title:Multiple NETGEAR Fixes for product cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117672

Trust: 0.6

sources: CNVD: CNVD-2021-28035 // JVNDB: JVNDB-2017-015010 // CNNVD: CNNVD-202005-115

EXTERNAL IDS

db:NVDid:CVE-2017-18866

Trust: 3.1

db:JVNDBid:JVNDB-2017-015010

Trust: 0.8

db:CNVDid:CNVD-2021-28035

Trust: 0.6

db:CNNVDid:CNNVD-202005-115

Trust: 0.6

db:VULMONid:CVE-2017-18866

Trust: 0.1

sources: CNVD: CNVD-2021-28035 // VULMON: CVE-2017-18866 // JVNDB: JVNDB-2017-015010 // CNNVD: CNNVD-202005-115 // NVD: CVE-2017-18866

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2017-18866

Trust: 2.0

url:https://kb.netgear.com/000051472/security-advisory-for-stored-cross-site-scripting-on-routers-psv-2016-0100

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18866

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-28035 // VULMON: CVE-2017-18866 // JVNDB: JVNDB-2017-015010 // CNNVD: CNNVD-202005-115 // NVD: CVE-2017-18866

SOURCES

db:CNVDid:CNVD-2021-28035
db:VULMONid:CVE-2017-18866
db:JVNDBid:JVNDB-2017-015010
db:CNNVDid:CNNVD-202005-115
db:NVDid:CVE-2017-18866

LAST UPDATE DATE

2024-11-23T23:04:23.983000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-28035date:2021-04-23T00:00:00
db:VULMONid:CVE-2017-18866date:2020-05-08T00:00:00
db:JVNDBid:JVNDB-2017-015010date:2020-06-05T00:00:00
db:CNNVDid:CNNVD-202005-115date:2020-05-09T00:00:00
db:NVDid:CVE-2017-18866date:2024-11-21T03:21:07.843

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-28035date:2021-04-14T00:00:00
db:VULMONid:CVE-2017-18866date:2020-05-05T00:00:00
db:JVNDBid:JVNDB-2017-015010date:2020-06-05T00:00:00
db:CNNVDid:CNNVD-202005-115date:2020-05-05T00:00:00
db:NVDid:CVE-2017-18866date:2020-05-05T14:15:12.327