CVE-2016-10174

CVE Published 2017-01-30
Related CWE(s) CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
Related Vendor(s) netgear
Related Product(s) wnr2050_firmware, wnr2020_firmware, wndr3700v4_firmware, r7500_firmware, wnr2000v3_firmware, d7000_firmware, wndr4300v2_firmware, d6100_firmware, wnr618_firmware, wnr2000v4_firmware, wnr1000v4_firmware, r6220_firmware, wnr2000v5_firmware, wnr2500_firmware, jwnr2010v5_firmware, wndr3800_firmware, jnr1010v2_firmware, wnr1000v2_firmware, wnr614_firmware, r2000_firmware, r6100_firmware, r7500v2_firmware, wnr2200_firmware, wndr4500v3_firmware, wndr4700_firmware, wndr4300_firmware, d7800_firmware, jnr3300_firmware
Exploitation Reported (CISA KEV) 2022-03-25
CVSS 3 Base Score 9.8 (CRITICAL)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Associated CAPEC Patterns

References