CVE-2016-10174

Summary

CVECVE-2016-10174
StatePUBLISHED
Assignermitre
Source PriorityCVE Program / NVD first with legacy fallback
Published2017-01-30 04:59:00 UTC
Updated2026-04-21 16:26:40 UTC
DescriptionThe NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.

Risk And Classification

Primary CVSS: v3.1 9.8 CRITICAL from [email protected]

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS: 0.910730000 probability, percentile 0.996450000 (date 2026-04-22)

CISA KEV: Listed on 2022-03-25; due 2022-04-15; ransomware use Unknown

Problem Types: CWE-120 | n/a | CWE-120 CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


VersionSourceTypeScoreSeverityVector
3.1[email protected]Primary9.8CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.1ADPDECLARED9.8CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.1134c704f-9b21-4f2e-91b3-4a467353bcc0Secondary9.8CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.0[email protected]Primary10AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0 Breakdown

Access Vector
Network
Access Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete

AV:N/AC:L/Au:N/C:C/I:C/A:C

CISA Known Exploited Vulnerability

VendorNETGEAR
ProductWNR2000v5 Router
NameNETGEAR WNR2000v5 Router Buffer Overflow Vulnerability
Required ActionApply updates per vendor instructions.
Noteshttps://nvd.nist.gov/vuln/detail/CVE-2016-10174

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Netgear D6100 - All All All
Operating System Netgear D6100 Firmware - All All All
Hardware Netgear D7000 - All All All
Operating System Netgear D7000 Firmware - All All All
Hardware Netgear D7800 - All All All
Operating System Netgear D7800 Firmware - All All All
Hardware Netgear Jnr1010v2 - All All All
Operating System Netgear Jnr1010v2 Firmware - All All All
Hardware Netgear Jnr3300 - All All All
Operating System Netgear Jnr3300 Firmware - All All All
Hardware Netgear Jwnr2010v5 - All All All
Operating System Netgear Jwnr2010v5 Firmware - All All All
Hardware Netgear R2000 - All All All
Operating System Netgear R2000 Firmware - All All All
Hardware Netgear R6100 - All All All
Operating System Netgear R6100 Firmware - All All All
Hardware Netgear R6220 - All All All
Operating System Netgear R6220 Firmware - All All All
Hardware Netgear R7500 - All All All
Hardware Netgear R7500v2 - All All All
Operating System Netgear R7500v2 Firmware - All All All
Operating System Netgear R7500 Firmware - All All All
Hardware Netgear Wndr3700v4 - All All All
Operating System Netgear Wndr3700v4 Firmware - All All All
Hardware Netgear Wndr3800 - All All All
Operating System Netgear Wndr3800 Firmware - All All All
Hardware Netgear Wndr4300 - All All All
Hardware Netgear Wndr4300v2 - All All All
Operating System Netgear Wndr4300v2 Firmware - All All All
Operating System Netgear Wndr4300 Firmware - All All All
Hardware Netgear Wndr4500v3 - All All All
Operating System Netgear Wndr4500v3 Firmware - All All All
Hardware Netgear Wndr4700 - All All All
Operating System Netgear Wndr4700 Firmware - All All All
Hardware Netgear Wnr1000v2 - All All All
Operating System Netgear Wnr1000v2 Firmware - All All All
Hardware Netgear Wnr1000v4 - All All All
Operating System Netgear Wnr1000v4 Firmware - All All All
Hardware Netgear Wnr2000v3 - All All All
Operating System Netgear Wnr2000v3 Firmware - All All All
Hardware Netgear Wnr2000v4 - All All All
Operating System Netgear Wnr2000v4 Firmware - All All All
Hardware Netgear Wnr2000v5 - All All All
Operating System Netgear Wnr2000v5 Firmware - All All All
Hardware Netgear Wnr2020 - All All All
Operating System Netgear Wnr2020 Firmware - All All All
Hardware Netgear Wnr2050 - All All All
Operating System Netgear Wnr2050 Firmware - All All All
Hardware Netgear Wnr2200 - All All All
Operating System Netgear Wnr2200 Firmware - All All All
Hardware Netgear Wnr2500 - All All All
Operating System Netgear Wnr2500 Firmware - All All All
Hardware Netgear Wnr614 - All All All
Operating System Netgear Wnr614 Firmware - All All All
Hardware Netgear Wnr618 - All All All
Operating System Netgear Wnr618 Firmware - All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Na N/a affected n/a Not specified

References

ReferenceSourceLinkTags
Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit) - Hardware remote Exploit af854a3a-2127-422b-91ae-364da2661108 www.exploit-db.com Exploit, Third Party Advisory, VDB Entry
Full Disclosure: [0-day] RCE and admin credential disclosure in NETGEAR WNR2000 af854a3a-2127-422b-91ae-364da2661108 seclists.org Exploit, Mailing List, Third Party Advisory, VDB Entry
raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt af854a3a-2127-422b-91ae-364da2661108 raw.githubusercontent.com Exploit, Technical Description, Third Party Advisory
Netgear WNR2000v5 - Remote Code Execution - CGI remote Exploit af854a3a-2127-422b-91ae-364da2661108 www.exploit-db.com Exploit, Third Party Advisory, VDB Entry
Netgear WNR2000 Multiple Security Vulnerabilities af854a3a-2127-422b-91ae-364da2661108 www.securityfocus.com Broken Link, Third Party Advisory, VDB Entry
Insecure Remote Access and Command Execution Security Vulnerability, PSV-2016-0255 | Answer | NETGEAR Support af854a3a-2127-422b-91ae-364da2661108 kb.netgear.com Vendor Advisory
www.cisa.gov/known-exploited-vulnerabilities-catalog 134c704f-9b21-4f2e-91b3-4a467353bcc0 www.cisa.gov US Government Resource
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Additional Advisory Data

SourceTimeEvent
ADP2022-03-25T00:00:00.000ZCVE-2016-10174 added to CISA KEV
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report