QID 731250

Date Published: 2024-03-29

QID 731250: NETGEAR Remote Code Execution (RCE) Vulnerability

CVE-2016-1555: NETGEAR WNAP320 Access Point Firmware version 2.0.3 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.

Affected Devices:
WN604 Wireless N-150 Access Point
WN802Tv2 Wireless-N Access Point
WNAP210v2 ProSAFE Wireless-N Access Point
WNAP320 ProSAFE Wireless-N Access Point
WNDAP350 ProSAFE Dual Band Wireless-N Access Point
WNDAP360 ProSAFE Dual Band Wireless-N Access Point
WNDAP660 ProSAFE Dual Band Wireless-N Access Point

Patched Versions:
WN604 Wireless N-150 Access Point v3.3.3 or later
WNAP210v2 ProSAFE Wireless-N Access Point v3.5.5.0 or later
WNAP320 ProSAFE Wireless-N Access Point v3.5.5.0 or later
WNDAP350 ProSAFE Dual Band Wireless-N Access Point v3.5.5.0 or later
WNDAP360 ProSAFE Dual Band Wireless-N Access Point v3.5.5.0 or later
WNDAP660 ProSAFE Dual Band Wireless-N Access Point v3.5.5.0 or later

QID Detection Logic (Unauthenticated):
This QID sends a crafted payload as an HTTP POST request that triggers a callback to the scanner, if vulnerable. Please note that this QID relies on a callback to the scanner on a random port. The target must be enabled to connect back to any random port on the scanner.

Successful exploitation of the vulnerability may allow an unauthenticated attacker to execute arbitrary code, leading to complete system compromise.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    The vendor has released a patch addressing the vulnerability. For more information, please refer to the Netgear Security Advisory

    Vendor References

    CVEs related to QID 731250

    Software Advisories
    Advisory ID Software Component Link
    Netgear Security Advisory URL Logo kb.netgear.com/30480/CVE-2016-1555-Notification