ID

VAR-201404-0471


CVE

CVE-2014-0355


TITLE

ZyXEL Wireless N300 NetUSB Router NBG-419N devices contain multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#939260

DESCRIPTION

Multiple stack-based buffer overflows on the ZyXEL Wireless N300 NetUSB NBG-419N router with firmware 1.00(BFQ.6)C0 allow man-in-the-middle attackers to execute arbitrary code via (1) a long temp attribute in a yweather:condition element in a forecastrss file that is processed by the checkWeather function; the (2) WeatherCity or (3) WeatherDegree variable to the detectWeather function; unspecified input to the (4) UpnpAddRunRLQoS, (5) UpnpDeleteRunRLQoS, or (6) UpnpDeletePortCheckType function; or (7) the SET COUNTRY udps command. ZyXEL Wireless N300 NetUSB Router NBG-419N running firmware version 1.00(BFQ.6)C0, and possibly earlier versions, is susceptible to multiple vulnerabilities. Other device models that use similar firmware may also be vulnerable. ZyXEL Wireless N300 NetUSB Router NBG-419N is a router device. ZyXEL Wireless N300 NetUSB Router NBG-419N The UpnpDeleteRunRLQoS(), UpnpDeleteRunRLQoS() and UpnpDeletePortCheckType() functions have a buffer overflow vulnerability that allows an attacker to submit a specially crafted stack overflow for a denial of service attack or arbitrary code execution. An attacker can exploit these issues to bypass certain security restrictions and execute arbitrary code or commands in the context of the affected device. This may aid in further attacks

Trust: 3.24

sources: NVD: CVE-2014-0355 // CERT/CC: VU#939260 // JVNDB: JVNDB-2014-002026 // CNVD: CNVD-2014-02360 // BID: 66794 // VULHUB: VHN-67848

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02360

AFFECTED PRODUCTS

vendor:zyxelmodel:n300 netusb nbg-419nscope:eqversion:1.00\(bfq_6\)c0

Trust: 1.6

vendor:zyxelmodel:n300 netusb nbg-419nscope:eqversion: -

Trust: 1.0

vendor:zyxelmodel: - scope: - version: -

Trust: 0.8

vendor:zyxelmodel:wireless n300 netusb router nbg-419nscope: - version: -

Trust: 0.8

vendor:zyxelmodel:wireless n300 netusb router nbg-419nscope:eqversion:1.00(bfq.6)c0

Trust: 0.8

vendor:zyxelmodel:n300 netusb router nbg-419n 1.00 c0scope: - version: -

Trust: 0.6

sources: CERT/CC: VU#939260 // CNVD: CNVD-2014-02360 // JVNDB: JVNDB-2014-002026 // CNNVD: CNNVD-201404-206 // NVD: CVE-2014-0355

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0355
value: HIGH

Trust: 1.0

NVD: CVE-2014-0355
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-02360
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201404-206
value: HIGH

Trust: 0.6

VULHUB: VHN-67848
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0355
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-02360
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-67848
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-02360 // VULHUB: VHN-67848 // JVNDB: JVNDB-2014-002026 // CNNVD: CNNVD-201404-206 // NVD: CVE-2014-0355

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-67848 // JVNDB: JVNDB-2014-002026 // NVD: CVE-2014-0355

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201404-206

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201404-206

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002026

PATCH

title:NBG-419N v2url:http://www.zyxel.com/us/en/products_services/nbg_419n_v2.shtml?t=p

Trust: 0.8

sources: JVNDB: JVNDB-2014-002026

EXTERNAL IDS

db:CERT/CCid:VU#939260

Trust: 4.2

db:NVDid:CVE-2014-0355

Trust: 3.4

db:JVNid:JVNVU94935747

Trust: 1.4

db:BIDid:66794

Trust: 0.9

db:JVNDBid:JVNDB-2014-002026

Trust: 0.8

db:CNNVDid:CNNVD-201404-206

Trust: 0.7

db:CNVDid:CNVD-2014-02360

Trust: 0.6

db:NSFOCUSid:26504

Trust: 0.6

db:VULHUBid:VHN-67848

Trust: 0.1

sources: CERT/CC: VU#939260 // CNVD: CNVD-2014-02360 // VULHUB: VHN-67848 // BID: 66794 // JVNDB: JVNDB-2014-002026 // CNNVD: CNNVD-201404-206 // NVD: CVE-2014-0355

REFERENCES

url:http://www.kb.cert.org/vuls/id/939260

Trust: 3.4

url:http://www.zyxel.com/

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/425.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/259.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/121.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0355

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94935747/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0355

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94935747/index.html

Trust: 0.6

url:http://www.nsfocus.net/vulndb/26504

Trust: 0.6

url:http://www.zyxel.com/products_services/nbg_419n_v2.shtml?t=p

Trust: 0.3

sources: CERT/CC: VU#939260 // CNVD: CNVD-2014-02360 // VULHUB: VHN-67848 // BID: 66794 // JVNDB: JVNDB-2014-002026 // CNNVD: CNNVD-201404-206 // NVD: CVE-2014-0355

CREDITS

Anonymous

Trust: 0.3

sources: BID: 66794

SOURCES

db:CERT/CCid:VU#939260
db:CNVDid:CNVD-2014-02360
db:VULHUBid:VHN-67848
db:BIDid:66794
db:JVNDBid:JVNDB-2014-002026
db:CNNVDid:CNNVD-201404-206
db:NVDid:CVE-2014-0355

LAST UPDATE DATE

2025-04-13T23:18:23.859000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#939260date:2014-04-16T00:00:00
db:CNVDid:CNVD-2014-02360date:2014-04-18T00:00:00
db:VULHUBid:VHN-67848date:2014-04-15T00:00:00
db:BIDid:66794date:2014-04-11T00:00:00
db:JVNDBid:JVNDB-2014-002026date:2014-04-17T00:00:00
db:CNNVDid:CNNVD-201404-206date:2014-04-16T00:00:00
db:NVDid:CVE-2014-0355date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#939260date:2014-04-11T00:00:00
db:CNVDid:CNVD-2014-02360date:2014-04-17T00:00:00
db:VULHUBid:VHN-67848date:2014-04-15T00:00:00
db:BIDid:66794date:2014-04-11T00:00:00
db:JVNDBid:JVNDB-2014-002026date:2014-04-17T00:00:00
db:CNNVDid:CNNVD-201404-206date:2014-04-16T00:00:00
db:NVDid:CVE-2014-0355date:2014-04-15T10:55:12.027