4 results (0.004 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple pages (setup.cgi and adv_index.htm) within the web management console are vulnerable to stored XSS, as demonstrated by the configuration of the UI language. Se detectó un problema en los dispositivos NETGEAR WNR1000V4 versión 1.1.0.54. Varias páginas (setup.cgi y adv_index.htm) dentro de la consola de administración web son vulnerables a ataques de tipo XSS almacenado, como es demostrado por la configuración del idioma de la interfaz de usuario. • https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the web management interface (setup.cgi) are vulnerable to command injection, allowing remote attackers to execute arbitrary commands, as demonstrated by shell metacharacters in the sysDNSHost parameter. Se detectó un problema en los dispositivos NETGEAR WNR1000V4 versión 1.1.0.54. Múltiples acciones dentro de la interfaz de administración web (setup.cgi) son vulnerables a una inyección de comandos, permitiendo a atacantes remotos ejecutar comandos arbitrarios, como es demostrado mediante metacaracteres de shell en el parámetro sysDNSHost. • https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie. Se detectó un problema en los dispositivos NETGEAR WNR1000V4 versión 1.1.0.54. La interfaz de administración web (setup.cgi) presenta una omisión de autenticación y otros problemas que finalmente permiten a un atacante comprometer remotamente el dispositivo desde una página web maliciosa. • https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2 • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the WNR1000V4 web management console are vulnerable to an unauthenticated GET request (exploitable directly or through CSRF), as demonstrated by the setup.cgi?todo=save_htp_account URI. Se detectó un problema en los dispositivos NETGEAR WNR1000V4 versión 1.1.0.54. Múltiples acciones dentro de la consola de administración web de WNR1000V4 son vulnerables a una petición GET no autenticada (explotable directamente o por medio de un ataque de tipo CSRF), como es demostrado mediante el URI setup.cgi? • https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2 • CWE-352: Cross-Site Request Forgery (CSRF) •