CVE-2016-10176

CRITICAL EXPLOITED

Netgear Wnr2000v5 Firmware < 1.0.0.34 - Improper Input Validation

Title source: rule

Description

The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.

Exploits (2)

exploitdb WORKING POC
by Pedro Ribeiro · rubyremotecgi
https://www.exploit-db.com/exploits/40949
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/netgear_wnr2000_pass_recovery.rb

Scores

CVSS v3 9.8
EPSS 0.8662
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2017-09-13
CWE
CWE-20
Status published
Products (1)
netgear/wnr2000v5_firmware < 1.0.0.34
Published Jan 30, 2017
Tracked Since Feb 18, 2026