An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don't require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d "REQ_ID=SUPPORT_IF_GET").
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN38248512/index.html | |
http://seclists.org/fulldisclosure/2018/Aug/26 | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-24T19:00:00
Updated: 2021-01-22T06:06:12
Reserved: 2017-08-05T00:00:00
Link: CVE-2017-12575
JSON object: View
NVD Information
Status : Modified
Published: 2018-08-24T19:29:00.800
Modified: 2021-01-26T18:15:24.223
Link: CVE-2017-12575
JSON object: View
Redhat Information
No data.
CWE