ID

VAR-201605-0315


CVE

CVE-2016-1207


TITLE

WN-G300R Series vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2016-000062

DESCRIPTION

Cross-site scripting (XSS) vulnerability on I-O DATA DEVICE WN-G300R devices with firmware 1.12 and earlier, WN-G300R2 devices with firmware 1.12 and earlier, and WN-G300R3 devices with firmware 1.01 and earlier allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. WN-G300R Series provided by I-O DATA DEVICE, INC. contains a cross-site scripting vulnerability. WN-G300R Series provided by I-O DATA DEVICE, INC. is a wireless LAN router. WN-G300R Series contains a stored cross-site scripting vulnerability (CWE-79). Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. and Yuta TESHIMA of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. WN-G300R Series Routers are prone to an unspecified HTML-injection vulnerability because it fails to properly sanitize user-supplied input. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible. The following versions are vulnerable: WN-G300R firmware Ver.1.12 and prior. WN-G300R2 firmware Ver.1.12 and prior. WN-G300R3 firmware Ver.1.01 and prior. IO DATA WN-G300R etc. Attackers can exploit this vulnerability to inject arbitrary web scripts or HTML

Trust: 2.52

sources: NVD: CVE-2016-1207 // JVNDB: JVNDB-2016-000062 // CNVD: CNVD-2016-03193 // BID: 90609 // VULHUB: VHN-90026

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-03193

AFFECTED PRODUCTS

vendor:iodatamodel:wn-g300r3scope:lteversion:1.01

Trust: 1.0

vendor:iodatamodel:wn-g300rscope:lteversion:1.12

Trust: 1.0

vendor:iodatamodel:wn-g300r2scope:lteversion:1.12

Trust: 1.0

vendor:i o data devicemodel:wn-g300rscope:lteversion:ver.1.12

Trust: 0.8

vendor:i o data devicemodel:wn-g300r2scope:lteversion:ver.1.12

Trust: 0.8

vendor:i o data devicemodel:wn-g300r3scope:lteversion:ver.1.01

Trust: 0.8

vendor:i omodel:data device wn-g300rscope:lteversion:<=1.12

Trust: 0.6

vendor:i omodel:data device wn-g300r2scope:lteversion:<=1.12

Trust: 0.6

vendor:i omodel:data device wn-g300r3scope:lteversion:<=1.01

Trust: 0.6

vendor:iodatamodel:wn-g300r2scope:eqversion: -

Trust: 0.6

vendor:iodatamodel:wn-g300r3scope:eqversion: -

Trust: 0.6

vendor:iodatamodel:wn-g300rscope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2016-03193 // JVNDB: JVNDB-2016-000062 // CNNVD: CNNVD-201605-377 // NVD: CVE-2016-1207

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1207
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2016-000062
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-03193
value: LOW

Trust: 0.6

CNNVD: CNNVD-201605-377
value: LOW

Trust: 0.6

VULHUB: VHN-90026
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2016-1207
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2016-000062
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:N/I:P/A:N
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-03193
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90026
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1207
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.0

Trust: 1.0

IPA: JVNDB-2016-000062
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-03193 // VULHUB: VHN-90026 // JVNDB: JVNDB-2016-000062 // CNNVD: CNNVD-201605-377 // NVD: CVE-2016-1207

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-90026 // JVNDB: JVNDB-2016-000062 // NVD: CVE-2016-1207

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201605-377

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201605-377

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-000062

PATCH

title:I-O DATA DEVICE, INC. websiteurl:http://www.iodata.jp/support/information/2016/wn-g300r_xss/

Trust: 0.8

title:Patch for multiple cross-site scripting vulnerabilities in I-ODATA productsurl:https://www.cnvd.org.cn/patchInfo/show/75964

Trust: 0.6

title:Multiple I-O DATA WN-G300R Fixes for product cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61694

Trust: 0.6

sources: CNVD: CNVD-2016-03193 // JVNDB: JVNDB-2016-000062 // CNNVD: CNNVD-201605-377

EXTERNAL IDS

db:JVNid:JVN22978346

Trust: 3.4

db:NVDid:CVE-2016-1207

Trust: 3.4

db:JVNDBid:JVNDB-2016-000062

Trust: 3.1

db:CNVDid:CNVD-2016-03193

Trust: 0.6

db:CNNVDid:CNNVD-201605-377

Trust: 0.6

db:BIDid:90609

Trust: 0.4

db:VULHUBid:VHN-90026

Trust: 0.1

sources: CNVD: CNVD-2016-03193 // VULHUB: VHN-90026 // BID: 90609 // JVNDB: JVNDB-2016-000062 // CNNVD: CNNVD-201605-377 // NVD: CVE-2016-1207

REFERENCES

url:http://jvn.jp/en/jp/jvn22978346/index.html

Trust: 3.4

url:http://www.iodata.jp/support/information/2016/wn-g300r_xss/

Trust: 1.7

url:http://jvndb.jvn.jp/en/contents/2016/jvndb-2016-000062.html

Trust: 1.2

url:http://jvndb.jvn.jp/jvndb/jvndb-2016-000062

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1207

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1207

Trust: 0.8

sources: CNVD: CNVD-2016-03193 // VULHUB: VHN-90026 // BID: 90609 // JVNDB: JVNDB-2016-000062 // CNNVD: CNNVD-201605-377 // NVD: CVE-2016-1207

CREDITS

Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. and Yuta TESHIMA of Cyber Defense Institute, Inc.

Trust: 0.3

sources: BID: 90609

SOURCES

db:CNVDid:CNVD-2016-03193
db:VULHUBid:VHN-90026
db:BIDid:90609
db:JVNDBid:JVNDB-2016-000062
db:CNNVDid:CNNVD-201605-377
db:NVDid:CVE-2016-1207

LAST UPDATE DATE

2025-04-13T23:37:29.122000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-03193date:2016-05-17T00:00:00
db:VULHUBid:VHN-90026date:2016-05-17T00:00:00
db:BIDid:90609date:2016-05-12T00:00:00
db:JVNDBid:JVNDB-2016-000062date:2016-06-01T00:00:00
db:CNNVDid:CNNVD-201605-377date:2016-05-13T00:00:00
db:NVDid:CVE-2016-1207date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-03193date:2016-05-17T00:00:00
db:VULHUBid:VHN-90026date:2016-05-14T00:00:00
db:BIDid:90609date:2016-05-12T00:00:00
db:JVNDBid:JVNDB-2016-000062date:2016-05-12T00:00:00
db:CNNVDid:CNNVD-201605-377date:2016-05-13T00:00:00
db:NVDid:CVE-2016-1207date:2016-05-14T16:59:01.197