ID

VAR-201512-0087


CVE

CVE-2015-7277


TITLE

Amped Wireless R10000 router contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#763576

DESCRIPTION

The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. Amped Wireless R10000 router, firmware version 2.5.2.11, uses default credentials, is vulnerable to cross-site request forgery, and uses insufficiently random values for DNS queries. AmpedWirelessR10000deviceswithfirmware is the R10000 series router from AmpedWireless. A credential management vulnerability exists in AmpedWirelessR10000deviceswithfirmware2.5.2.11. An attacker can exploit these issues to bypass certain security restrictions, allowing attackers to perform certain unauthorized actions or by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session. The vulnerability is due to the use of 'admin' as the password for the admin account

Trust: 3.33

sources: NVD: CVE-2015-7277 // CERT/CC: VU#763576 // JVNDB: JVNDB-2015-006584 // CNVD: CNVD-2016-00146 // BID: 78818 // VULHUB: VHN-85238 // VULMON: CVE-2015-7277

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-00146

AFFECTED PRODUCTS

vendor:ampedwirelessmodel:r10000scope:eqversion:2.5.2.11

Trust: 1.6

vendor:ampedmodel: - scope: - version: -

Trust: 0.8

vendor:ampedmodel:wireless r10000scope: - version: -

Trust: 0.8

vendor:ampedmodel:wireless r10000scope:eqversion:2.5.2.11

Trust: 0.8

vendor:ampedmodel:wireless r10000 devices withscope:eqversion:2.5.2.11

Trust: 0.6

sources: CERT/CC: VU#763576 // CNVD: CNVD-2016-00146 // JVNDB: JVNDB-2015-006584 // CNNVD: CNNVD-201512-316 // NVD: CVE-2015-7277

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7277
value: CRITICAL

Trust: 1.0

NVD: CVE-2015-7277
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-00146
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201512-316
value: CRITICAL

Trust: 0.6

VULHUB: VHN-85238
value: HIGH

Trust: 0.1

VULMON: CVE-2015-7277
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-7277
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-00146
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-85238
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7277
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-00146 // VULHUB: VHN-85238 // VULMON: CVE-2015-7277 // JVNDB: JVNDB-2015-006584 // CNNVD: CNNVD-201512-316 // NVD: CVE-2015-7277

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-85238 // JVNDB: JVNDB-2015-006584 // NVD: CVE-2015-7277

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-316

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201512-316

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006584

PATCH

title:High Power Wireless-N 600mW Smart Router R10000url:http://www.ampedwireless.com/products/r10000.html

Trust: 0.8

sources: JVNDB: JVNDB-2015-006584

EXTERNAL IDS

db:CERT/CCid:VU#763576

Trust: 4.0

db:NVDid:CVE-2015-7277

Trust: 3.5

db:BIDid:78818

Trust: 2.1

db:JVNid:JVNVU99863047

Trust: 0.8

db:JVNDBid:JVNDB-2015-006584

Trust: 0.8

db:CNNVDid:CNNVD-201512-316

Trust: 0.7

db:CNVDid:CNVD-2016-00146

Trust: 0.6

db:VULHUBid:VHN-85238

Trust: 0.1

db:VULMONid:CVE-2015-7277

Trust: 0.1

sources: CERT/CC: VU#763576 // CNVD: CNVD-2016-00146 // VULHUB: VHN-85238 // VULMON: CVE-2015-7277 // BID: 78818 // JVNDB: JVNDB-2015-006584 // CNNVD: CNNVD-201512-316 // NVD: CVE-2015-7277

REFERENCES

url:https://www.kb.cert.org/vuls/id/763576

Trust: 3.3

url:http://www.securityfocus.com/bid/78818

Trust: 1.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7277

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99863047/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7277

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/255.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CERT/CC: VU#763576 // CNVD: CNVD-2016-00146 // VULHUB: VHN-85238 // VULMON: CVE-2015-7277 // JVNDB: JVNDB-2015-006584 // CNNVD: CNNVD-201512-316 // NVD: CVE-2015-7277

CREDITS

Joel Land of the CERT/CC

Trust: 0.9

sources: BID: 78818 // CNNVD: CNNVD-201512-316

SOURCES

db:CERT/CCid:VU#763576
db:CNVDid:CNVD-2016-00146
db:VULHUBid:VHN-85238
db:VULMONid:CVE-2015-7277
db:BIDid:78818
db:JVNDBid:JVNDB-2015-006584
db:CNNVDid:CNNVD-201512-316
db:NVDid:CVE-2015-7277

LAST UPDATE DATE

2025-04-13T23:03:36.655000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#763576date:2015-12-10T00:00:00
db:CNVDid:CNVD-2016-00146date:2016-01-12T00:00:00
db:VULHUBid:VHN-85238date:2016-11-28T00:00:00
db:VULMONid:CVE-2015-7277date:2016-11-28T00:00:00
db:BIDid:78818date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006584date:2016-01-05T00:00:00
db:CNNVDid:CNNVD-201512-316date:2016-01-04T00:00:00
db:NVDid:CVE-2015-7277date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#763576date:2015-12-10T00:00:00
db:CNVDid:CNVD-2016-00146date:2016-01-12T00:00:00
db:VULHUBid:VHN-85238date:2015-12-31T00:00:00
db:VULMONid:CVE-2015-7277date:2015-12-31T00:00:00
db:BIDid:78818date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006584date:2016-01-05T00:00:00
db:CNNVDid:CNNVD-201512-316date:2015-12-11T00:00:00
db:NVDid:CVE-2015-7277date:2015-12-31T05:59:19.493