Multiple unrestricted file upload vulnerabilities in NETGEAR Management System NMS300 1.5.0.11 and earlier allow remote attackers to execute arbitrary Java code by using (1) fileUpload.do or (2) lib-1.0/external/flash/fileUpload.do to upload a JSP file, and then accessing it via a direct request for a /null URI.
References
Configurations
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html - | |
References | () http://seclists.org/fulldisclosure/2016/Feb/30 - | |
References | () http://www.kb.cert.org/vuls/id/777024 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/537446/100/0/threaded - | |
References | () https://www.exploit-db.com/exploits/39412/ - |
Information
Published : 2016-02-13 02:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1524
Mitre link : CVE-2016-1524
CVE.ORG link : CVE-2016-1524
JSON object : View
Products Affected
netgear
- prosafe_network_management_software_300
CWE