Vulnerability Name:

CVE-2016-10176 (CCN-121532)

Assigned:2017-01-29
Published:2017-01-29
Updated:2017-09-03
Summary:The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.2 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.1 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:F/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
9.4 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2016-10176

Source: MISC
Type: Patch, Vendor Advisory
http://kb.netgear.com/000036549/Insecure-Remote-Access-and-Command-Execution-Security-Vulnerability

Source: MISC
Type: Exploit, Third Party Advisory, VDB Entry
http://seclists.org/fulldisclosure/2016/Dec/72

Source: CCN
Type: Full-Disclosure Mailing List, Mon, 30 Jan 2017 10:00:57 +0000
Re: [0-day] RCE and admin credential disclosure in NETGEAR WNR2000

Source: CCN
Type: Netgear Web site
WNR2000

Source: BID
Type: Third Party Advisory, VDB Entry
95867

Source: CCN
Type: BID-95867
Netgear WNR2000 Multiple Security Vulnerabilities

Source: XF
Type: UNKNOWN
netgear-wnr2000-cve201610176-sec-bypass(121532)

Source: MISC
Type: Exploit, Technical Description, Third Party Advisory
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt

Source: EXPLOIT-DB
Type: UNKNOWN
40949

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netgear:wnr2000v5_firmware:*:*:*:*:*:*:*:* (Version <= 1.0.0.34)
  • AND
  • cpe:/h:netgear:wnr2000v5:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:netgear:wnr2000v5:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear wnr2000v5 firmware *
    netgear wnr2000v5 -
    netgear wnr2000v5 -