Page 23 of 113 results (0.067 seconds)

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet containing an opcode that will trigger the kernel module to return several addresses. One of which can be used to calculate the dynamic base address of the module for further exploitation. Existe una vulnerabilidad explotable de divulgación de información en el módulo de kernel KCodes NetUSB.ko que habilita la funcionalidad de la impresora ReadySHARE de al menos dos routers NETGEAR Nighthawk y posiblemente varios otros proveedores y productos. Un atacante remoto no autenticado puede crear y enviar un paquete que contiene un código de operación que hará que el módulo de kernel devuelva varias direcciones. • http://www.securityfocus.com/bid/108827 https://talosintelligence.com/vulnerability_reports/TALOS-2019-0776 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

An exploitable arbitrary memory read vulnerability exists in the KCodes NetUSB.ko kernel module which enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. A specially crafted index value can cause an invalid memory read, resulting in a denial of service or remote information disclosure. An unauthenticated attacker can send a crafted packet on the local network to trigger this vulnerability. Se presenta una vulnerabilidad explotable de lectura de memoria arbitraria en el módulo de kernel NetUSB.ko de KCodes, que habilita la funcionalidad de impresora ReadySHARE de al menos dos routers Nighthawk de NETGEAR y posiblemente otros proveedores y productos. Un valor de índice especialmente creado puede causar una lectura de memoria no válida, resultando en una denegación de servicio o divulgación de información remota. • http://www.securityfocus.com/bid/108820 https://talosintelligence.com/vulnerability_reports/TALOS-2019-0775 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 97%CPEs: 22EXPL: 3

NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. NETGEAR R6250 en versiones anteriores a 1.0.4.6.Beta, R6400 en versiones anteriores a 1.0.1.18.Beta, R6700 en versiones anteriores a 1.0.1.14.Beta, R6900, R7000 en versiones anteriores a 1.0.7.6.Beta, R7100LG en versiones anteriores a 1.0.0.28.Beta, R7300DST en versiones anteriores a 1.0.0.46.Beta, R7900 en versiones anteriores a 1.0.1.8.Beta, R8000 en versiones anteriores a 1.0.3.26.Beta, D6220, D6400, D7000 y posiblemente otros routers permiten a atacantes remotos ejecutar comandos a través de metacaractéres shell en la ruta info a cgi-bin/. Netgear R6400 suffers from a remote code execution vulnerability. NETGEAR confirmed multiple routers allow unauthenticated web pages to pass form input directly to the command-line interface, permitting remote code execution. • https://www.exploit-db.com/exploits/41598 https://www.exploit-db.com/exploits/40889 http://kb.netgear.com/000036386/CVE-2016-582384 http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html http://www.securityfocus.com/bid/94819 http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers https://kalypto.org/research/netgear-vulnerability-expanded https://www.kb.cert.org/vuls/id/582384 • CWE-352: Cross-Site Request Forgery (CSRF) •