| Vulnerability Name: | CVE-2016-11015 (CCN-170145) | ||||||||||||
| Assigned: | 2015-10-28 | ||||||||||||
| Published: | 2015-10-28 | ||||||||||||
| Updated: | 2020-11-10 | ||||||||||||
| Summary: | NETGEAR JNR1010 devices before 1.0.0.32 allow cgi-bin/webproc CSRF via the :InternetGatewayDevice.X_TWSZ-COM_URL_Filter.BlackList.1.URL parameter. | ||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-352 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-11015 Source: MISC Type: Exploit, Third Party Advisory https://cybersecurityworks.com/zerodays/cve-2016-11015-netgear.html Source: XF Type: UNKNOWN netgear-cve201611015-csrf(170145) Source: MISC Type: Exploit, Third Party Advisory https://github.com/cybersecurityworks/Disclosed/issues/13 Source: MISC Type: Exploit, Third Party Advisory https://lists.openwall.net/full-disclosure/2016/01/11/4 Source: CCN Type: Packet Storm Security [01-11-2016] Netgear 1.0.0.24 Cross Site Request Forgery Source: MISC Type: Exploit, Third Party Advisory, VDB Entry https://packetstormsecurity.com/files/135215/Netgear-1.0.0.24-Cross-Site-Request-Forgery.html Source: MISC Type: Third Party Advisory https://pmcg2k15.wordpress.com/2016/01/11/fd-cross-site-request-forgery-in-netgear-router-jnr1010-version-1-0-0-24/ Source: CCN Type: NETGEAR Web site NETGEAR | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||