An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don't require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d "REQ_ID=SUPPORT_IF_GET").
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN38248512/index.html | |
http://seclists.org/fulldisclosure/2018/Aug/26 | Mailing List Third Party Advisory |
http://jvn.jp/en/jp/JVN38248512/index.html | |
http://seclists.org/fulldisclosure/2018/Aug/26 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN38248512/index.html - | |
References | () http://seclists.org/fulldisclosure/2018/Aug/26 - Mailing List, Third Party Advisory |
Information
Published : 2018-08-24 19:29
Updated : 2024-11-21 03:09
NVD link : CVE-2017-12575
Mitre link : CVE-2017-12575
CVE.ORG link : CVE-2017-12575
JSON object : View
Products Affected
aterm
- wg2600hp2
- wg2600hp2_firmware
CWE
CWE-306
Missing Authentication for Critical Function