// For flags

CVE-2016-10176

Netgear WNR2000v5 - Remote Code Execution

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.

El router NETGEAR WNR2000v5 permite a un administrador realizar acciones sensibles invocando a la URL apply.cgi en el servidor web del dispositivo. Esta URL especial es manejada por el servidor web embebido (uhttpd) y procesada como corresponde. El servidor web también contiene otra URL, apply_noauth.cgi, que permite a un usuario no autenticado realizar acciones sensibles en el dispositivo. Esta funcionalidad puede ser explotada para cambiar la configuración del router (tal como la respuestas a las preguntas de recuperación de contraseña) y logar la ejecución remota de código.

Netgear WNR2000 suffers from a remote code execution vulnerability and various other security issues.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-21 CVE Published
  • 2017-01-29 CVE Reserved
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
Wnr2000v5 Firmware
Search vendor "Netgear" for product "Wnr2000v5 Firmware"
<= 1.0.0.34
Search vendor "Netgear" for product "Wnr2000v5 Firmware" and version " <= 1.0.0.34"
-
Affected
in Netgear
Search vendor "Netgear"
Wnr2000v5
Search vendor "Netgear" for product "Wnr2000v5"
--
Safe