ID

VAR-201601-0406


CVE

CVE-2016-1141


TITLE

HOME SPOT CUBE vulnerable to OS command injection

Trust: 0.8

sources: JVNDB: JVNDB-2016-000012

DESCRIPTION

KDDI HOME SPOT CUBE devices before 2 allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. HOME SPOT CUBE contains an OS command injection vulnerability. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary OS command may be executed with the privileges of the application. A security vulnerability exists in previous versions of KDDIHOMESPOTCUBE2. KDDI Home Spot Cube is prone to the following security vulnerabilities: Cross-site scripting - CVE-2016-1136 Open redirect - CVE-2016-1137 HTTP header injection - CVE-2016-1138 Cross-site request forgery - CVE-2016-1139 Click jacking - CVE-2016-1140 OS command injection - CVE-2016-1141 Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions. Note- HOME SPOT CUBE2 is not affected by these vulnerabilities

Trust: 2.52

sources: NVD: CVE-2016-1141 // JVNDB: JVNDB-2016-000012 // CNVD: CNVD-2016-00911 // BID: 81982 // VULHUB: VHN-89960

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-00911

AFFECTED PRODUCTS

vendor:kddimodel:home spot cubescope:eqversion:2.0

Trust: 1.6

vendor:kddimodel:home spot cubescope: - version: -

Trust: 0.8

vendor:kddimodel:home spot cube devicesscope:ltversion:2

Trust: 0.6

vendor:kddimodel:home spot cubescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-00911 // BID: 81982 // JVNDB: JVNDB-2016-000012 // CNNVD: CNNVD-201601-694 // NVD: CVE-2016-1141

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1141
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2016-000012
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-00911
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201601-694
value: MEDIUM

Trust: 0.6

VULHUB: VHN-89960
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1141
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2016-000012
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-00911
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-89960
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1141
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 3.4
version: 3.0

Trust: 1.0

IPA: JVNDB-2016-000012
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-00911 // VULHUB: VHN-89960 // JVNDB: JVNDB-2016-000012 // CNNVD: CNNVD-201601-694 // NVD: CVE-2016-1141

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-89960 // JVNDB: JVNDB-2016-000012 // NVD: CVE-2016-1141

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-694

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201601-694

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-000012

PATCH

title:Notes on use of HOME SPOT CUBEurl:http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06

Trust: 0.8

title:KDDIHOMESPOTCUBEdevices has an unspecified vulnerability (CNVD-2016-00911) patchurl:https://www.cnvd.org.cn/patchInfo/show/71235

Trust: 0.6

sources: CNVD: CNVD-2016-00911 // JVNDB: JVNDB-2016-000012

EXTERNAL IDS

db:NVDid:CVE-2016-1141

Trust: 3.4

db:JVNid:JVN54686544

Trust: 2.8

db:JVNDBid:JVNDB-2016-000012

Trust: 2.5

db:BIDid:81982

Trust: 0.9

db:CNNVDid:CNNVD-201601-694

Trust: 0.7

db:CNVDid:CNVD-2016-00911

Trust: 0.6

db:VULHUBid:VHN-89960

Trust: 0.1

sources: CNVD: CNVD-2016-00911 // VULHUB: VHN-89960 // BID: 81982 // JVNDB: JVNDB-2016-000012 // CNNVD: CNNVD-201601-694 // NVD: CVE-2016-1141

REFERENCES

url:http://jvn.jp/en/jp/jvn54686544/index.html

Trust: 2.8

url:http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06

Trust: 2.0

url:http://jvndb.jvn.jp/jvndb/jvndb-2016-000012

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1141

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1141

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1140

Trust: 0.6

sources: CNVD: CNVD-2016-00911 // VULHUB: VHN-89960 // BID: 81982 // JVNDB: JVNDB-2016-000012 // CNNVD: CNNVD-201601-694 // NVD: CVE-2016-1141

CREDITS

Masaki Yoshikawa

Trust: 0.3

sources: BID: 81982

SOURCES

db:CNVDid:CNVD-2016-00911
db:VULHUBid:VHN-89960
db:BIDid:81982
db:JVNDBid:JVNDB-2016-000012
db:CNNVDid:CNNVD-201601-694
db:NVDid:CVE-2016-1141

LAST UPDATE DATE

2025-04-13T23:23:41.733000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-00911date:2016-02-15T00:00:00
db:VULHUBid:VHN-89960date:2016-02-02T00:00:00
db:BIDid:81982date:2016-01-27T00:00:00
db:JVNDBid:JVNDB-2016-000012date:2016-02-16T00:00:00
db:CNNVDid:CNNVD-201601-694date:2016-02-01T00:00:00
db:NVDid:CVE-2016-1141date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-00911date:2016-02-15T00:00:00
db:VULHUBid:VHN-89960date:2016-01-30T00:00:00
db:BIDid:81982date:2016-01-27T00:00:00
db:JVNDBid:JVNDB-2016-000012date:2016-01-27T00:00:00
db:CNNVDid:CNNVD-201601-694date:2016-01-30T00:00:00
db:NVDid:CVE-2016-1141date:2016-01-30T15:59:05.860