ID

VAR-201504-0624


TITLE

ZYXEL P-660HN-T1H_IPv6 Remote Configuration Editor / Web Server Denial of Service Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2015-02768

DESCRIPTION

ZYXEL P-660HN-T1H_IPv6 is a wireless router device. A denial of service vulnerability exists in ZYXEL P-660HN-T1H_IPv6. Since ZYXEL Embedded fails to properly check for cookies and credentials in the POST method, an attacker can change the settings and methods back view page; initiate a denial of service attack.

Trust: 0.6

sources: CNVD: CNVD-2015-02768

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02768

AFFECTED PRODUCTS

vendor:zyxelmodel:p-660hn-t1h ipv6 1.02scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2015-02768

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2015-02768
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2015-02768
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2015-02768

EXTERNAL IDS

db:EXPLOITDBid:36825

Trust: 0.6

db:EXPLOIT-DBid:36825

Trust: 0.6

db:CNVDid:CNVD-2015-02768

Trust: 0.6

sources: CNVD: CNVD-2015-02768

REFERENCES

url:https://www.exploit-db.com/exploits/36825/

Trust: 0.6

sources: CNVD: CNVD-2015-02768

SOURCES

db:CNVDid:CNVD-2015-02768

LAST UPDATE DATE

2022-05-17T02:00:00.737000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02768date:2015-04-28T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02768date:2015-04-28T00:00:00