Files
CVEs-PoC/2016/CVE-2016-5649.md
T
2024-06-18 02:51:15 +02:00

22 lines
1.4 KiB
Markdown

### [CVE-2016-5649](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5649)
![](https://img.shields.io/static/v1?label=Product&message=DGN2200&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DGND3700&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=DGN2200-V1.0.0.50_7.0.50DGN2200-V1.0.0.50_7.0.50%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=DGND3700-V1.0.0.17_1.0.17DGND3700-V1.0.0.17_1.0.17%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-319&color=brighgreen)
### Description
A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.
### POC
#### Reference
- http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html
- https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates