CVE-2015-7282

ReadyNet WRT300N-DD devices with firmware 1.0.26 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port.
References
Link Resource
http://www.securityfocus.com/bid/78814
https://www.kb.cert.org/vuls/id/167992 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/78814
https://www.kb.cert.org/vuls/id/167992 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:readynet_solutions:wrt300n-dd_firmware:1.0.26:*:*:*:*:*:*:*
cpe:2.3:h:readynet_solutions:wrt300n-dd:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/78814 - () http://www.securityfocus.com/bid/78814 -
References () https://www.kb.cert.org/vuls/id/167992 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/167992 - Third Party Advisory, US Government Resource

Information

Published : 2015-12-31 05:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7282

Mitre link : CVE-2015-7282

CVE.ORG link : CVE-2015-7282


JSON object : View

Products Affected

readynet_solutions

  • wrt300n-dd
  • wrt300n-dd_firmware
CWE
CWE-20

Improper Input Validation