Vulnerabilites related to dd-wrt - dd-wrt
Vulnerability from fkie_nvd
Published
2022-08-05 22:15
Modified
2024-11-21 06:56
Severity ?
Summary
A memory corruption vulnerability exists in the httpd unescape functionality of DD-WRT Revision 32270 - Revision 48599. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dd-wrt:dd-wrt:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A66BA5-0646-4644-8E49-8C10C29A4735", "versionEndIncluding": "48599", "versionStartIncluding": "32270", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability exists in the httpd unescape functionality of DD-WRT Revision 32270 - Revision 48599. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de corrupci\u00f3n de memoria en la funcionalidad httpd unescape de DD-WRT Revisi\u00f3n 32270 - Revisi\u00f3n 48599. Una petici\u00f3n HTTP especialmente dise\u00f1ada puede conllevar a una corrupci\u00f3n de memoria. Un atacante puede enviar una petici\u00f3n de red para desencadenar esta vulnerabilidad" } ], "id": "CVE-2022-27631", "lastModified": "2024-11-21T06:56:03.577", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-05T22:15:11.373", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "talos-cna@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-06 18:15
Modified
2024-11-21 01:45
Severity ?
Summary
Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://lists.openwall.net/bugtraq/2013/07/12/2 | Third Party Advisory | |
cve@mitre.org | https://packetstormsecurity.com/files/cve/CVE-2012-6297 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://seclists.org/fulldisclosure/2013/Oct/241 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://vuldb.com/?id.9527 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.openwall.net/bugtraq/2013/07/12/2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://packetstormsecurity.com/files/cve/CVE-2012-6297 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/fulldisclosure/2013/Oct/241 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.9527 | Permissions Required |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dd-wrt:dd-wrt:24:sp2:*:*:*:*:*:*", "matchCriteriaId": "5515BF1F-F0AD-4C02-9CD3-539C382D7CB6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de Inyecci\u00f3n de Comandos por medio de un CSRF en DD-WRT 24-sp2 a partir de valores de configuraci\u00f3n especialmente dise\u00f1ados que contienen metacaracteres de shell, lo que podr\u00eda permitir a un usuario malicioso remoto causar una Denegaci\u00f3n de Servicio." } ], "id": "CVE-2012-6297", "lastModified": "2024-11-21T01:45:58.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-06T18:15:12.947", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.openwall.net/bugtraq/2013/07/12/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/cve/CVE-2012-6297" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/2013/Oct/241" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.9527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.openwall.net/bugtraq/2013/07/12/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/cve/CVE-2012-6297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/2013/Oct/241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.9527" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-14 15:16
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dd-wrt:dd-wrt:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "B493087F-145B-41F9-979C-ABE3DFCD63BD", "versionEndIncluding": "24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en apply.cgi in DD-WRT 24 sp1 y anteriores, permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que (1) ejecuten comandos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro ping_id, (2) cambien las credenciales administrativas a trav\u00e9s de los par\u00e1metro http_username y http_passwd,(3) activen la administraci\u00f3n remota a trav\u00e9s del par\u00e1metro remote_management o (4) configure el reenv\u00edo de puerto a trav\u00e9s de los par\u00e1metros from, tom ip y pro." } ], "id": "CVE-2008-6974", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-08-14T15:16:27.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/499024" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/499119" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/499132" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/499135" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/9209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/9209" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-14 15:16
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a "weak ... anti-CSRF fix" implemented in 24 sp2.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dd-wrt:dd-wrt:24:sp2:*:*:*:*:*:*", "matchCriteriaId": "99F93777-C194-4920-900C-629F214F846E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a \"weak ... anti-CSRF fix\" implemented in 24 sp2." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en apply.cgi in DD-WRT 24 sp2, permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que (1) ejecuten comandos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro ping_id, (2) cambien las credenciales administrativas a trav\u00e9s de los par\u00e1metro http_username y http_passwd,(3) activen la administraci\u00f3n remota a trav\u00e9s del par\u00e1metro remote_management o (4) configure el reenv\u00edo de puerto a trav\u00e9s de los par\u00e1metros from, tom ip y pro. NOTE: Esta caracter\u00edstica reportada existe debido a \"debilidad ... soluci\u00f3n anti-CSRF\" implementada en 24 sp2." } ], "id": "CVE-2008-6975", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-08-14T15:16:27.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/499024" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/499119" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/499135" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/9209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/499024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/499135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/9209" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-14 15:16
Modified
2025-04-09 00:30
Severity ?
Summary
httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dd-wrt:dd-wrt:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "B493087F-145B-41F9-979C-ABE3DFCD63BD", "versionEndIncluding": "24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI." }, { "lang": "es", "value": "httpd.c en httpd en el gestor GUI en DD-WRT 24 sp1 y otras versiones anteriores a la build 12533, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres shell en una petici\u00f3n a la URI cgi-bin." } ], "id": "CVE-2009-2765", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-14T15:16:27.577", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://isc.sans.org/diary.html?storyid=6853" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022596" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dd-wrt.com/" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/9209" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/55990" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/35742" }, { "source": "cve@mitre.org", "url": "http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://isc.sans.org/diary.html?storyid=6853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dd-wrt.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/9209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/55990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/35742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-14 15:16
Modified
2025-04-09 00:30
Severity ?
Summary
httpd.c in httpd in the management GUI in DD-WRT 24 sp1 does not require administrative authentication for programs under cgi-bin/, which allows remote attackers to change settings via HTTP requests.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dd-wrt:dd-wrt:24:sp1:*:*:*:*:*:*", "matchCriteriaId": "184B9DB2-7BB7-46D0-A095-5FAFE4F646CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "httpd.c in httpd in the management GUI in DD-WRT 24 sp1 does not require administrative authentication for programs under cgi-bin/, which allows remote attackers to change settings via HTTP requests." }, { "lang": "es", "value": "httpd.c en httpd en el gestor GUI en DD-WRT 24 sp1 no requiere autenticaci\u00f3n administrativa para programas en cgi-bin/, lo que permite a atacantes remotos modificar la configuraci\u00f3n a trav\u00e9s del protocolo HTTP." } ], "id": "CVE-2009-2766", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-14T15:16:27.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/9209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/9209" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-09 14:15
Modified
2024-11-21 05:02
Severity ?
Summary
An issue was discovered in DD-WRT through 16214. The Diagnostic page allows remote attackers to execute arbitrary commands via shell metacharacters in the host field of the ping command. Exploitation through CSRF might be possible. NOTE: software maintainers consider the report invalid because it refers to an old software version, requires administrative privileges, and does not provide access beyond that already available to administrative users
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://svn.dd-wrt.com/ticket/7039 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://svn.dd-wrt.com/ticket/7039 | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dd-wrt:dd-wrt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B898E72-EAEB-4EDE-979B-7512CFF97D38", "versionEndIncluding": "16214", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in DD-WRT through 16214. The Diagnostic page allows remote attackers to execute arbitrary commands via shell metacharacters in the host field of the ping command. Exploitation through CSRF might be possible. NOTE: software maintainers consider the report invalid because it refers to an old software version, requires administrative privileges, and does not provide access beyond that already available to administrative users" }, { "lang": "es", "value": "** EN DISPUTA ** Se detect\u00f3 un problema en DD-WRT versiones hasta 16214. La p\u00e1gina Diagnostic permite a atacantes remotos ejecutar comandos arbitrarios por medio de metacaracteres de shell en el campo host del comando ping. Una explotaci\u00f3n por medio de un ataque de tipo CSRF podr\u00eda ser posible. NOTA: los encargados del mantenimiento del software consideran que el reporte no es v\u00e1lido porque se refiere a una versi\u00f3n de software anterior, requiere privilegios administrativos y no proporciona acceso m\u00e1s all\u00e1 del que ya est\u00e1 disponible para usuarios administrativos" } ], "id": "CVE-2020-13976", "lastModified": "2024-11-21T05:02:16.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-09T14:15:10.017", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://svn.dd-wrt.com/ticket/7039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://svn.dd-wrt.com/ticket/7039" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-13976 (GCVE-0-2020-13976)
Vulnerability from cvelistv5
Published
2020-06-09 13:07
Modified
2024-11-18 17:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in DD-WRT through 16214. The Diagnostic page allows remote attackers to execute arbitrary commands via shell metacharacters in the host field of the ping command. Exploitation through CSRF might be possible. NOTE: software maintainers consider the report invalid because it refers to an old software version, requires administrative privileges, and does not provide access beyond that already available to administrative users
References
▼ | URL | Tags |
---|---|---|
https://svn.dd-wrt.com/ticket/7039 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://svn.dd-wrt.com/ticket/7039" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-13976", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-24T17:33:10.368953Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T17:28:39.274Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in DD-WRT through 16214. The Diagnostic page allows remote attackers to execute arbitrary commands via shell metacharacters in the host field of the ping command. Exploitation through CSRF might be possible. NOTE: software maintainers consider the report invalid because it refers to an old software version, requires administrative privileges, and does not provide access beyond that already available to administrative users" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-09T13:07:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://svn.dd-wrt.com/ticket/7039" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13976", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** An issue was discovered in DD-WRT through 16214. The Diagnostic page allows remote attackers to execute arbitrary commands via shell metacharacters in the host field of the ping command. Exploitation through CSRF might be possible. NOTE: software maintainers consider the report invalid because it refers to an old software version, requires administrative privileges, and does not provide access beyond that already available to administrative users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://svn.dd-wrt.com/ticket/7039", "refsource": "MISC", "url": "https://svn.dd-wrt.com/ticket/7039" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13976", "datePublished": "2020-06-09T13:07:18", "dateReserved": "2020-06-09T00:00:00", "dateUpdated": "2024-11-18T17:28:39.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6297 (GCVE-0-2012-6297)
Vulnerability from cvelistv5
Published
2020-02-06 17:01
Modified
2024-08-06 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.
References
▼ | URL | Tags |
---|---|---|
https://packetstormsecurity.com/files/cve/CVE-2012-6297 | x_refsource_MISC | |
https://vuldb.com/?id.9527 | x_refsource_MISC | |
https://seclists.org/fulldisclosure/2013/Oct/241 | mailing-list, x_refsource_FULLDISC | |
https://lists.openwall.net/bugtraq/2013/07/12/2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/cve/CVE-2012-6297" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.9527" }, { "name": "[CVE-2012-6297] DD-WRT v24-sp2 Command Injection", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "https://seclists.org/fulldisclosure/2013/Oct/241" }, { "name": "CVE-2012-6297 - Command Injection via CSRF on DD-WRT v24-sp2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://lists.openwall.net/bugtraq/2013/07/12/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-06T17:01:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/cve/CVE-2012-6297" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.9527" }, { "name": "[CVE-2012-6297] DD-WRT v24-sp2 Command Injection", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "https://seclists.org/fulldisclosure/2013/Oct/241" }, { "name": "CVE-2012-6297 - Command Injection via CSRF on DD-WRT v24-sp2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://lists.openwall.net/bugtraq/2013/07/12/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://packetstormsecurity.com/files/cve/CVE-2012-6297", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/cve/CVE-2012-6297" }, { "name": "https://vuldb.com/?id.9527", "refsource": "MISC", "url": "https://vuldb.com/?id.9527" }, { "name": "[CVE-2012-6297] DD-WRT v24-sp2 Command Injection", "refsource": "FULLDISC", "url": "https://seclists.org/fulldisclosure/2013/Oct/241" }, { "name": "CVE-2012-6297 - Command Injection via CSRF on DD-WRT v24-sp2", "refsource": "BUGTRAQ", "url": "https://lists.openwall.net/bugtraq/2013/07/12/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6297", "datePublished": "2020-02-06T17:01:25", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6975 (GCVE-0-2008-6975)
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 11:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a "weak ... anti-CSRF fix" implemented in 24 sp2.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/9209 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/archive/1/499119 | mailing-list, x_refsource_BUGTRAQ | |
http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/499135 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/499024 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:49:02.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/9209" }, { "name": "20081210 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499119" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499135" }, { "name": "20081208 Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a \"weak ... anti-CSRF fix\" implemented in 24 sp2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/9209" }, { "name": "20081210 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499119" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499135" }, { "name": "20081208 Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6975", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a \"weak ... anti-CSRF fix\" implemented in 24 sp2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9209", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/9209" }, { "name": "20081210 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499119" }, { "name": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173", "refsource": "MISC", "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499135" }, { "name": "20081208 Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499024" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6975", "datePublished": "2009-08-14T15:00:00", "dateReserved": "2009-08-14T00:00:00", "dateUpdated": "2024-08-07T11:49:02.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-27631 (GCVE-0-2022-27631)
Vulnerability from cvelistv5
Published
2022-08-05 21:19
Modified
2025-04-15 18:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A memory corruption vulnerability exists in the httpd unescape functionality of DD-WRT Revision 32270 - Revision 48599. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-27631", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-15T18:18:42.739291Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T18:53:26.678Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DD-WRT", "vendor": "DD-WRT", "versions": [ { "status": "affected", "version": "Revision 32270 - Revision 48599" } ] } ], "datePublic": "2022-07-27T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability exists in the httpd unescape functionality of DD-WRT Revision 32270 - Revision 48599. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00.000Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2022-27631", "datePublished": "2022-08-05T21:19:29.848Z", "dateReserved": "2022-04-05T00:00:00.000Z", "dateUpdated": "2025-04-15T18:53:26.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2765 (GCVE-0-2009-2765)
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 05:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/35742 | vdb-entry, x_refsource_BID | |
http://www.exploit-db.com/exploits/9209 | exploit, x_refsource_EXPLOIT-DB | |
http://www.dd-wrt.com/ | x_refsource_CONFIRM | |
http://www.osvdb.org/55990 | vdb-entry, x_refsource_OSVDB | |
http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/ | x_refsource_MISC | |
http://isc.sans.org/diary.html?storyid=6853 | x_refsource_MISC | |
http://securitytracker.com/id?1022596 | vdb-entry, x_refsource_SECTRACK | |
http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 | x_refsource_MISC | |
http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35742", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35742" }, { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/9209" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dd-wrt.com/" }, { "name": "55990", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55990" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.org/diary.html?storyid=6853" }, { "name": "1022596", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022596" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35742", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35742" }, { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/9209" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dd-wrt.com/" }, { "name": "55990", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55990" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.org/diary.html?storyid=6853" }, { "name": "1022596", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022596" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "tags": [ "x_refsource_MISC" ], "url": "http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2765", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35742", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35742" }, { "name": "9209", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/9209" }, { "name": "http://www.dd-wrt.com/", "refsource": "CONFIRM", "url": "http://www.dd-wrt.com/" }, { "name": "55990", "refsource": "OSVDB", "url": "http://www.osvdb.org/55990" }, { "name": "http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/", "refsource": "MISC", "url": "http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/" }, { "name": "http://isc.sans.org/diary.html?storyid=6853", "refsource": "MISC", "url": "http://isc.sans.org/diary.html?storyid=6853" }, { "name": "1022596", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022596" }, { "name": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173", "refsource": "MISC", "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb", "refsource": "MISC", "url": "http://metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2765", "datePublished": "2009-08-14T15:00:00", "dateReserved": "2009-08-14T00:00:00", "dateUpdated": "2024-08-07T05:59:57.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2766 (GCVE-0-2009-2766)
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 05:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
httpd.c in httpd in the management GUI in DD-WRT 24 sp1 does not require administrative authentication for programs under cgi-bin/, which allows remote attackers to change settings via HTTP requests.
References
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/9209 | exploit, x_refsource_EXPLOIT-DB | |
http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:57.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/9209" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "httpd.c in httpd in the management GUI in DD-WRT 24 sp1 does not require administrative authentication for programs under cgi-bin/, which allows remote attackers to change settings via HTTP requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/9209" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2766", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "httpd.c in httpd in the management GUI in DD-WRT 24 sp1 does not require administrative authentication for programs under cgi-bin/, which allows remote attackers to change settings via HTTP requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9209", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/9209" }, { "name": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173", "refsource": "MISC", "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2766", "datePublished": "2009-08-14T15:00:00", "dateReserved": "2009-08-14T00:00:00", "dateUpdated": "2024-08-07T05:59:57.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6974 (GCVE-0-2008-6974)
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 11:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/9209 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/archive/1/499132 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/499119 | mailing-list, x_refsource_BUGTRAQ | |
http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/499135 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/499024 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:49:02.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/9209" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499132" }, { "name": "20081210 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499119" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499135" }, { "name": "20081208 Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9209", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/9209" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499132" }, { "name": "20081210 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499119" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499135" }, { "name": "20081208 Multiple XSRF in DD-WRT (Remote Root Command Execution)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9209", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/9209" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499132" }, { "name": "20081210 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499119" }, { "name": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173", "refsource": "MISC", "url": "http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173" }, { "name": "20081211 Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499135" }, { "name": "20081208 Multiple XSRF in DD-WRT (Remote Root Command Execution)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499024" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6974", "datePublished": "2009-08-14T15:00:00", "dateReserved": "2009-08-14T00:00:00", "dateUpdated": "2024-08-07T11:49:02.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }