ID

VAR-201711-0521


CVE

CVE-2017-16902


TITLE

Vonage VDV-23 Home router buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-010820

DESCRIPTION

On the Vonage VDV-23 115 3.2.11-0.9.40 home router, sending a long string of characters in the loginPassword and/or loginUsername field to goform/login causes the router to reboot. Vonage VDV-23 Home routers contain a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. VonageVDV-23115 is a routing repeater from Vonage Corporation of the United States. A security vulnerability exists in the Vonage VDV-231153.2.11-0.9.40 release

Trust: 2.25

sources: NVD: CVE-2017-16902 // JVNDB: JVNDB-2017-010820 // CNVD: CNVD-2017-37697 // VULHUB: VHN-107871

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-37697

AFFECTED PRODUCTS

vendor:vonagemodel:vdv-23scope:eqversion:3.2.11-0.9.40

Trust: 2.2

vendor:vonagemodel:vdv-23scope:eqversion:115 3.2.11-0.9.40

Trust: 0.8

sources: CNVD: CNVD-2017-37697 // JVNDB: JVNDB-2017-010820 // CNNVD: CNNVD-201711-853 // NVD: CVE-2017-16902

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-16902
value: HIGH

Trust: 1.0

NVD: CVE-2017-16902
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-37697
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201711-853
value: HIGH

Trust: 0.6

VULHUB: VHN-107871
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-16902
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-37697
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-107871
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-16902
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-37697 // VULHUB: VHN-107871 // JVNDB: JVNDB-2017-010820 // CNNVD: CNNVD-201711-853 // NVD: CVE-2017-16902

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-107871 // JVNDB: JVNDB-2017-010820 // NVD: CVE-2017-16902

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201711-853

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201711-853

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010820

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-107871

PATCH

title:Top Pageurl:https://www.vonage.com/personal

Trust: 0.8

title:VonageVDV-23115 patch for denial of service vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/111291

Trust: 0.6

title:Vonage VDV-23 115 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76606

Trust: 0.6

sources: CNVD: CNVD-2017-37697 // JVNDB: JVNDB-2017-010820 // CNNVD: CNNVD-201711-853

EXTERNAL IDS

db:NVDid:CVE-2017-16902

Trust: 3.1

db:EXPLOIT-DBid:43164

Trust: 1.7

db:JVNDBid:JVNDB-2017-010820

Trust: 0.8

db:CNNVDid:CNNVD-201711-853

Trust: 0.7

db:EXPLOITDBid:43164

Trust: 0.6

db:CNVDid:CNVD-2017-37697

Trust: 0.6

db:VULHUBid:VHN-107871

Trust: 0.1

sources: CNVD: CNVD-2017-37697 // VULHUB: VHN-107871 // JVNDB: JVNDB-2017-010820 // CNNVD: CNNVD-201711-853 // NVD: CVE-2017-16902

REFERENCES

url:http://gh0s7.net/vonage2

Trust: 2.3

url:https://www.exploit-db.com/exploits/43164/

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16902

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-16902

Trust: 0.8

url:http://gh0s7.com/vonage2/

Trust: 0.8

sources: CNVD: CNVD-2017-37697 // VULHUB: VHN-107871 // JVNDB: JVNDB-2017-010820 // CNNVD: CNNVD-201711-853 // NVD: CVE-2017-16902

SOURCES

db:CNVDid:CNVD-2017-37697
db:VULHUBid:VHN-107871
db:JVNDBid:JVNDB-2017-010820
db:CNNVDid:CNNVD-201711-853
db:NVDid:CVE-2017-16902

LAST UPDATE DATE

2025-04-20T23:36:45.126000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-37697date:2017-12-21T00:00:00
db:VULHUBid:VHN-107871date:2017-12-12T00:00:00
db:JVNDBid:JVNDB-2017-010820date:2017-12-25T00:00:00
db:CNNVDid:CNNVD-201711-853date:2017-11-22T00:00:00
db:NVDid:CVE-2017-16902date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-37697date:2017-12-21T00:00:00
db:VULHUBid:VHN-107871date:2017-11-20T00:00:00
db:JVNDBid:JVNDB-2017-010820date:2017-12-25T00:00:00
db:CNNVDid:CNNVD-201711-853date:2017-11-22T00:00:00
db:NVDid:CVE-2017-16902date:2017-11-20T18:29:00.283