ReadyNet WRT300N-DD devices with firmware 1.0.26 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/78814 | |
https://www.kb.cert.org/vuls/id/167992 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/78814 | |
https://www.kb.cert.org/vuls/id/167992 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/78814 - | |
References | () https://www.kb.cert.org/vuls/id/167992 - Third Party Advisory, US Government Resource |
Information
Published : 2015-12-31 05:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7282
Mitre link : CVE-2015-7282
CVE.ORG link : CVE-2015-7282
JSON object : View
Products Affected
readynet_solutions
- wrt300n-dd
- wrt300n-dd_firmware
CWE
CWE-20
Improper Input Validation