ID

VAR-201612-0649


TITLE

ZyXEL P660HN-T v2 Router Unauthenticated Remote Command Execution Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2016-13300

DESCRIPTION

ZyXELP660HN-Tv2 is a router manufactured by ZyXEL. The ZyXELP660HN-Tv2 router has an unauthenticated remote command execution vulnerability. Because the ServerIP parameter has command injection and the device has a default account, the attacker is allowed to exploit the vulnerability to execute arbitrary code remotely.

Trust: 0.6

sources: CNVD: CNVD-2016-13300

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-13300

AFFECTED PRODUCTS

vendor:zyxelmodel:p660hn-tscope:eqversion:v2

Trust: 0.6

sources: CNVD: CNVD-2016-13300

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2016-13300
value: HIGH

Trust: 0.6

CNVD: CNVD-2016-13300
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2016-13300

EXTERNAL IDS

db:CNVDid:CNVD-2016-13300

Trust: 0.6

sources: CNVD: CNVD-2016-13300

REFERENCES

url:https://blogs.securiteam.com/index.php/archives/2910

Trust: 0.6

sources: CNVD: CNVD-2016-13300

SOURCES

db:CNVDid:CNVD-2016-13300

LAST UPDATE DATE

2022-05-04T09:23:32.173000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-13300date:2016-12-30T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-13300date:2016-12-30T00:00:00