5
CVSSv2

CVE-2016-10175

Published: 30/01/2017 Updated: 03/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success.html URI. This serial number allows a user to obtain the administrator username and password, when used in combination with the CVE-2016-10176 vulnerability that allows resetting the answers to the password-recovery questions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

netgear wnr2000v5_firmware

Exploits

# # Remote code execution in NETGEAR WNR2000v5 # - by Pedro Ribeiro (pedrib@gmailcom) / Agile Information Security # Released on 20/12/2016 # # NOTE: this exploit is "alpha" quality and has been deprecated Please see the modules # accepted into the Metasploit framework, or githubcom/pedrib/PoC/tree/master/exploits/metasploit/wnr2000 # # ...