Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows an attacker on the same network segment to bypass access restriction to perform arbitrary operations via unspecified vectors.
References
Link | Resource |
---|---|
http://corega.jp/support/security/20161111_wlr300nx.htm | Third Party Advisory |
http://www.securityfocus.com/bid/94248 | Third Party Advisory VDB Entry |
https://jvn.jp/en/jp/JVN23549283/index.html | Third Party Advisory VDB Entry |
http://corega.jp/support/security/20161111_wlr300nx.htm | Third Party Advisory |
http://www.securityfocus.com/bid/94248 | Third Party Advisory VDB Entry |
https://jvn.jp/en/jp/JVN23549283/index.html | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://corega.jp/support/security/20161111_wlr300nx.htm - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94248 - Third Party Advisory, VDB Entry | |
References | () https://jvn.jp/en/jp/JVN23549283/index.html - Third Party Advisory, VDB Entry |
Information
Published : 2017-06-09 16:29
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7811
Mitre link : CVE-2016-7811
CVE.ORG link : CVE-2016-7811
JSON object : View
Products Affected
corega
- cg-wlr300nx_firmware
- cg-wlr300nx
CWE
CWE-284
Improper Access Control