Search criteria

3 vulnerabilities found for cg-wlr300nx by corega

VAR-201706-0088

Vulnerability from variot - Updated: 2025-04-20 23:25

Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows an attacker on the same network segment to bypass access restriction to perform arbitrary operations via unspecified vectors. CG-WLR300NX provided by Corega Inc is a wireless LAN router. CG-WLR300NX fails to restrict access permissions. Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. Corega CG-WLR300NX is prone to following security vulnerabilities: 1. A security bypass vulnerability 2. A cross-site scripting vulnerability 3. A cross-site request forgery vulnerability An attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, bypass security restrictions or perform unauthorized actions. Other attacks may also be possible. Corega CG-WLR300NX 1.20 and prior are vulnerable. A security vulnerability exists in the Corega CG-WLR300NX with firmware version 1.20 and earlier

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0088",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cg-wlr300nx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "cg-wlr300nx",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "corega",
        "version": "ver. 1.20"
      },
      {
        "model": "cg-wlr300nx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.10"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.00"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.30"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:corega:cg-wlr300nx_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc.",
    "sources": [
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-7811",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CVE-2016-7811",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000219",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "VHN-96631",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-7811",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "IPA",
            "availabilityImpact": "Low",
            "baseScore": 6.8,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000219",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-7811",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-000219",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201611-350",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-96631",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows an attacker on the same network segment to bypass access restriction to perform arbitrary operations via unspecified vectors. CG-WLR300NX provided by Corega Inc is a wireless LAN router. CG-WLR300NX fails to restrict access permissions. Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. Corega CG-WLR300NX is prone to following security vulnerabilities:\n1. A security bypass vulnerability\n2. A cross-site scripting vulnerability\n3. A cross-site request forgery vulnerability\nAn attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, bypass security restrictions or perform unauthorized actions. Other attacks may also be possible. \nCorega CG-WLR300NX 1.20 and prior are vulnerable. A security vulnerability exists in the Corega CG-WLR300NX with firmware version 1.20 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-7811",
        "trust": 2.8
      },
      {
        "db": "JVN",
        "id": "JVN23549283",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "94248",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN23823838",
        "trust": 0.3
      },
      {
        "db": "JVN",
        "id": "JVN92237169",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-96631",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "id": "VAR-201706-0088",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-20T23:25:01.772000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "About Multiple Vulnerabilities of CG-WLR300NX",
        "trust": 0.8,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm"
      },
      {
        "title": "Corega CG-WLR300NX Repair measures for security bypass vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65713"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-284",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://jvn.jp/en/jp/jvn23549283/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/94248"
      },
      {
        "trust": 1.7,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7811"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7811"
      },
      {
        "trust": 0.3,
        "url": "http://corega.jp/support/security/20151224_wlbaragm.htm"
      },
      {
        "trust": 0.3,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm "
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn23549283/index.htmls"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn23823838/index.html "
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn92237169/index.html "
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "date": "2016-11-10T00:00:00",
        "db": "BID",
        "id": "94248"
      },
      {
        "date": "2016-11-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "date": "2016-11-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "date": "2017-06-09T16:29:00.657000",
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96631"
      },
      {
        "date": "2016-11-24T01:09:00",
        "db": "BID",
        "id": "94248"
      },
      {
        "date": "2018-01-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2016-7811"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CG-WLR300NX fails to restrict access permissions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000219"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-350"
      }
    ],
    "trust": 0.6
  }
}

VAR-201706-0086

Vulnerability from variot - Updated: 2025-04-20 23:25

Cross-site request forgery (CSRF) vulnerability in Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows remote attackers to hijack the authentication of logged in user to conduct unintended operations via unspecified vectors. CG-WLR300NX provided by Corega Inc is a wireless LAN router. Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. Corega CG-WLR300NX is prone to following security vulnerabilities: 1. A security bypass vulnerability 2. A cross-site request forgery vulnerability An attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, bypass security restrictions or perform unauthorized actions. Other attacks may also be possible. Corega CG-WLR300NX 1.20 and prior are vulnerable. A remote attacker could exploit this vulnerability to perform unauthorized operations

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0086",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cg-wlr300nx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "cg-wlr300nx",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "corega",
        "version": "ver. 1.20"
      },
      {
        "model": "cg-wlr300nx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.10"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.00"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.30"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:corega:cg-wlr300nx_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc.",
    "sources": [
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-7809",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2016-7809",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000217",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-96629",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-7809",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 7.1,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000217",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-7809",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-000217",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201611-362",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-96629",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows remote attackers to hijack the authentication of logged in user to conduct unintended operations via unspecified vectors. CG-WLR300NX provided by Corega Inc is a wireless LAN router. Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. Corega CG-WLR300NX is prone to following security vulnerabilities:\n1. A security bypass vulnerability\n2. A cross-site request forgery vulnerability\nAn attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, bypass security restrictions or perform unauthorized actions. Other attacks may also be possible. \nCorega CG-WLR300NX 1.20 and prior are vulnerable. A remote attacker could exploit this vulnerability to perform unauthorized operations",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN23823838",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "94248",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN23549283",
        "trust": 0.3
      },
      {
        "db": "JVN",
        "id": "JVN92237169",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-96629",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "id": "VAR-201706-0086",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-20T23:25:01.741000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "About Multiple Vulnerabilities of CG-WLR300NX",
        "trust": 0.8,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm"
      },
      {
        "title": "Corega CG-WLR300NX Fixes for cross-site request forgery vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65721"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://jvn.jp/en/jp/jvn23823838/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/94248"
      },
      {
        "trust": 1.7,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7809"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7809"
      },
      {
        "trust": 0.3,
        "url": "http://corega.jp/support/security/20151224_wlbaragm.htm"
      },
      {
        "trust": 0.3,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm "
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn23549283/index.htmls"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn23823838/index.html "
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn92237169/index.html "
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "date": "2016-11-10T00:00:00",
        "db": "BID",
        "id": "94248"
      },
      {
        "date": "2016-11-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "date": "2016-11-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "date": "2017-06-09T16:29:00.580000",
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96629"
      },
      {
        "date": "2016-11-24T01:09:00",
        "db": "BID",
        "id": "94248"
      },
      {
        "date": "2018-01-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2016-7809"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CG-WLR300NX vulnerable to cross-site request forgery",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000217"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-362"
      }
    ],
    "trust": 0.6
  }
}

VAR-201706-0087

Vulnerability from variot - Updated: 2025-04-20 23:25

Cross-site scripting vulnerability in Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows attacker with administrator rights to inject arbitrary web script or HTML via unspecified vectors. CG-WLR300NX provided by Corega Inc is a wireless LAN router. Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. Corega CG-WLR300NX is prone to following security vulnerabilities: 1. A security bypass vulnerability 2. A cross-site request forgery vulnerability An attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, bypass security restrictions or perform unauthorized actions. Other attacks may also be possible. Corega CG-WLR300NX 1.20 and prior are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0087",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cg-wlr300nx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "cg-wlr300nx",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "corega",
        "version": "ver. 1.20"
      },
      {
        "model": "cg-wlr300nx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.20"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.10"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.00"
      },
      {
        "model": "inc cg-wlr300nx",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "corega",
        "version": "1.30"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:corega:cg-wlr300nx_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc.",
    "sources": [
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-7810",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "CVE-2016-7810",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "Single",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 2.7,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000218",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "VHN-96630",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.7,
            "id": "CVE-2016-7810",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000218",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "High",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-7810",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-000218",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201611-351",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-96630",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting vulnerability in Corega CG-WLR300NX firmware Ver. 1.20 and earlier allows attacker with administrator rights to inject arbitrary web script or HTML via unspecified vectors. CG-WLR300NX provided by Corega Inc is a wireless LAN router. Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user\u0027s web browser. Corega CG-WLR300NX is prone to following security vulnerabilities:\n1. A security bypass vulnerability\n2. A cross-site request forgery vulnerability\nAn attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, bypass security restrictions or perform unauthorized actions. Other attacks may also be possible. \nCorega CG-WLR300NX 1.20 and prior are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN92237169",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "94248",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN23823838",
        "trust": 0.3
      },
      {
        "db": "JVN",
        "id": "JVN23549283",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-96630",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "id": "VAR-201706-0087",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-20T23:25:01.710000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "About Multiple Vulnerabilities of CG-WLR300NX",
        "trust": 0.8,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm"
      },
      {
        "title": "Corega CG-WLR300NX Fixes for cross-site scripting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65714"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://jvn.jp/en/jp/jvn92237169/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/94248"
      },
      {
        "trust": 1.7,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7810"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7810"
      },
      {
        "trust": 0.3,
        "url": "http://corega.jp/support/security/20151224_wlbaragm.htm"
      },
      {
        "trust": 0.3,
        "url": "http://corega.jp/support/security/20161111_wlr300nx.htm "
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn23549283/index.htmls"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn23823838/index.html "
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn92237169/index.html "
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "db": "BID",
        "id": "94248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "date": "2016-11-10T00:00:00",
        "db": "BID",
        "id": "94248"
      },
      {
        "date": "2016-11-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "date": "2016-11-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "date": "2017-06-09T16:29:00.610000",
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-96630"
      },
      {
        "date": "2016-11-24T01:09:00",
        "db": "BID",
        "id": "94248"
      },
      {
        "date": "2018-01-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      },
      {
        "date": "2017-06-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2016-7810"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CG-WLR300NX vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000218"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201611-351"
      }
    ],
    "trust": 0.6
  }
}