8.6
CVSSv3

CVE-2016-1525

Published: 13/02/2016 Updated: 09/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 8.6 | Impact Score: 4 | Exploitability Score: 3.9
VMScore: 790
Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and previous versions allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

netgear prosafe network management software 300 1.5.0.11

Exploits

Netgear Pro NMS 300 suffers from code execution and arbitrary file download vulnerabilities ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::EXE def initialize(info = {}) super(update_info ...
>> Remote code execution / arbitrary file download in NETGEAR ProSafe Network Management System NMS300 >> Discovered by Pedro Ribeiro (pedrib@gmailcom), Agile Information Security (wwwagileinfoseccouk/) ========================================================================== Disclosure: 04/02/2016 / Last updated: 04/02/2016 ...

Recent Articles

No patches for code exec holes in Netgear management box
The Register • Team Register • 07 Feb 2016

Metasploit modules unleashed.

Two dangerous un-patched remote code execution vulnerabilities that allow access to God-mode system privileges have been reported in Netgear's ProSafe Network Management 300 management software. The file upload vulnerability (CVE-2016-1524) and restricted directory traversal (CVE-2016-1525) allow unauthenticated attackers to upload arbitrary files to the server's root web directory and access any file on servers. Carnegie Mellon University CERT analyst Joel Land says there is no known fix and re...