4.6
CVSSv2

CVE-2017-1000494

Published: 03/01/2018 Updated: 30/05/2019
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Uninitialized stack variable vulnerability in NameValueParserEndElt (upnpreplyparse.c) in miniupnpd < 2.0 allows an malicious user to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact

Vulnerable Product Search on Vulmon Subscribe to Product

miniupnp project miniupnpd

Vendor Advisories

Debian Bug report logs - #887129 miniupnpd: CVE-2017-1000494 Package: src:miniupnpd; Maintainer for src:miniupnpd is Thomas Goirand &lt;zigo@debianorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Sun, 14 Jan 2018 09:27:04 UTC Severity: important Tags: security, upstream Found in version miniupnpd/18 ...
MiniUPnP could be made to crash or run programs if it received specially crafted network traffic ...

Github Repositories

Router Netgear AC1000 Analysis Basic Access The usual interaction with the router is done through the web portal at wwwrouterlogincom By going to the url wwwrouterlogincom/setupcgi?todo=debug it will open a telnet service on port 23 to connect to Logging in with the same login as the routerlogin gives shell access to the router Some vulnerable processes running on the ro