Search criteria
5 vulnerabilities found for ib-wra150n by iball
VAR-201709-0349
Vulnerability from variot - Updated: 2025-04-20 23:37An authentication bypass vulnerability on iBall Baton ADSL2+ Home Router FW_iB-LR7011A_1.0.2 devices potentially allows attackers to directly access administrative router settings by crafting URLs with a .cgi extension, as demonstrated by /info.cgi and /password.cgi. iBall Baton ADSL2+ Home Router Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iBallBatonADSL2+HomeRouter is a router of iBall India. An authentication bypass vulnerability exists in the iBallBatonADSL2+HomeRouterFW_iB-LR7011A_1.0.2 release. An attacker could exploit the vulnerability to log into the admin panel by building a URL with a .cgi extension
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "ib-wra150n",
"scope": "eq",
"trust": 1.0,
"vendor": "iball",
"version": "fw_ib-lr7011a_1.0.2"
},
{
"_id": null,
"model": "baton adsl2+ home router",
"scope": "eq",
"trust": 0.8,
"vendor": "iball",
"version": "fw_ib-lr7011a_1.0.2"
},
{
"_id": null,
"model": "baton adsl2+ home router fw ib-lr7011a 1.0.2",
"scope": null,
"trust": 0.6,
"vendor": "iball",
"version": null
},
{
"_id": null,
"model": "wra150n",
"scope": "eq",
"trust": 0.6,
"vendor": "iball",
"version": "fw_ib-lr7011a_1.0.2"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10302"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-268"
},
{
"db": "NVD",
"id": "CVE-2017-14244"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:iball:wra150n_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
}
]
},
"cve": "CVE-2017-14244",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2017-14244",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10302",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-104947",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-14244",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-14244",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-14244",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-14244",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2018-10302",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201709-268",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-104947",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2017-14244",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10302"
},
{
"db": "VULHUB",
"id": "VHN-104947"
},
{
"db": "VULMON",
"id": "CVE-2017-14244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-268"
},
{
"db": "NVD",
"id": "CVE-2017-14244"
}
]
},
"description": {
"_id": null,
"data": "An authentication bypass vulnerability on iBall Baton ADSL2+ Home Router FW_iB-LR7011A_1.0.2 devices potentially allows attackers to directly access administrative router settings by crafting URLs with a .cgi extension, as demonstrated by /info.cgi and /password.cgi. iBall Baton ADSL2+ Home Router Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iBallBatonADSL2+HomeRouter is a router of iBall India. An authentication bypass vulnerability exists in the iBallBatonADSL2+HomeRouterFW_iB-LR7011A_1.0.2 release. An attacker could exploit the vulnerability to log into the admin panel by building a URL with a .cgi extension",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
},
{
"db": "CNVD",
"id": "CNVD-2018-10302"
},
{
"db": "VULHUB",
"id": "VHN-104947"
},
{
"db": "VULMON",
"id": "CVE-2017-14244"
}
],
"trust": 2.34
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-104947",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42740",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-104947"
},
{
"db": "VULMON",
"id": "CVE-2017-14244"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2017-14244",
"trust": 3.2
},
{
"db": "EXPLOIT-DB",
"id": "42740",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201709-268",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-10302",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-96644",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-104947",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-14244",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10302"
},
{
"db": "VULHUB",
"id": "VHN-104947"
},
{
"db": "VULMON",
"id": "CVE-2017-14244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-268"
},
{
"db": "NVD",
"id": "CVE-2017-14244"
}
]
},
"id": "VAR-201709-0349",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10302"
},
{
"db": "VULHUB",
"id": "VHN-104947"
}
],
"trust": 1.5181818
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10302"
}
]
},
"last_update_date": "2025-04-20T23:37:49.065000Z",
"patch": {
"_id": null,
"data": [
{
"title": "ADSL2+ Home Router",
"trust": 0.8,
"url": "https://www.iball.co.in/Product/ADSL2--Home-Router/746"
},
{
"title": "iBall-UTStar-CVEChecker",
"trust": 0.1,
"url": "https://github.com/GemGeorge/iBall-UTStar-CVEChecker "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2017-14244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-425",
"trust": 1.0
},
{
"problemtype": "CWE-255",
"trust": 0.9
},
{
"problemtype": "CWE-287",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-104947"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
},
{
"db": "NVD",
"id": "CVE-2017-14244"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.6,
"url": "https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broadband-modem-authentication-bypass"
},
{
"trust": 1.9,
"url": "https://www.exploit-db.com/exploits/42740/"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14244"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14244"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2017-14244/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/425.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/gemgeorge/iball-utstar-cvechecker"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10302"
},
{
"db": "VULHUB",
"id": "VHN-104947"
},
{
"db": "VULMON",
"id": "CVE-2017-14244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
},
{
"db": "CNNVD",
"id": "CNNVD-201709-268"
},
{
"db": "NVD",
"id": "CVE-2017-14244"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-10302",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-104947",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2017-14244",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2017-008254",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201709-268",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2017-14244",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10302",
"ident": null
},
{
"date": "2017-09-17T00:00:00",
"db": "VULHUB",
"id": "VHN-104947",
"ident": null
},
{
"date": "2017-09-17T00:00:00",
"db": "VULMON",
"id": "CVE-2017-14244",
"ident": null
},
{
"date": "2017-10-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-008254",
"ident": null
},
{
"date": "2017-09-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-268",
"ident": null
},
{
"date": "2017-09-17T19:29:00.240000",
"db": "NVD",
"id": "CVE-2017-14244",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-05-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10302",
"ident": null
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-104947",
"ident": null
},
{
"date": "2021-06-21T00:00:00",
"db": "VULMON",
"id": "CVE-2017-14244",
"ident": null
},
{
"date": "2017-10-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-008254",
"ident": null
},
{
"date": "2021-06-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201709-268",
"ident": null
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-14244",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-268"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "iBall Baton ADSL2+ Home Router Vulnerabilities related to certificate and password management",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-008254"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201709-268"
}
],
"trust": 0.6
}
}
VAR-201703-1116
Vulnerability from variot - Updated: 2025-04-20 23:22iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n devices are prone to an authentication bypass vulnerability that allows remote attackers to view and modify administrative router settings by reading the HTML source code of the password.cgi file. iBallBaton150MWirelessRouter is a wireless router. The iBallBaton150MWirelessRouter has an authentication bypass vulnerability. An attacker could exploit the vulnerability to bypass the authentication mechanism and perform unauthorized operations. iBall Baton 150M Wireless Router is prone to a authentication-bypass vulnerability. This may lead to further attacks. iBall Baton 150M Wireless Router 1.2.6 build 110401 Rel.47776n is vulnerable; other versions may also be affected. Devices using the following firmware and hardware are affected: firmware version 1.2.6 build 110401 Rel.47776n; hardware version iB-WRA150N v1 00000001
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201703-1116",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ib-wra150n",
"scope": "eq",
"trust": 1.0,
"vendor": "iball",
"version": "1.2.6"
},
{
"model": "baton 150m wireless-n broadband router",
"scope": "eq",
"trust": 0.8,
"vendor": "iball",
"version": "ib-wra150n v1 00000001"
},
{
"model": "baton 150m wireless-n broadband router",
"scope": "eq",
"trust": 0.8,
"vendor": "iball",
"version": "1.2.6 build 110401 rel.47776n"
},
{
"model": "baton 150m wireless-n adsi.2+ router",
"scope": "eq",
"trust": 0.6,
"vendor": "iball",
"version": "1.2.6"
},
{
"model": "baton 150m wireless-n router",
"scope": "eq",
"trust": 0.6,
"vendor": "iball",
"version": "1.2.6"
},
{
"model": "baton 150m wireless-n adsi.2+ router build",
"scope": "eq",
"trust": 0.3,
"vendor": "iball",
"version": "1.2.6110401"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "BID",
"id": "96822"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:iball:baton_150m_wireless-n_router",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:iball:baton_150m_wireless-n_router_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Indrajith.A.N",
"sources": [
{
"db": "BID",
"id": "96822"
}
],
"trust": 0.3
},
"cve": "CVE-2017-6558",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2017-6558",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-03186",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-114761",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-6558",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-6558",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-6558",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-03186",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201703-408",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-114761",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2017-6558",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n devices are prone to an authentication bypass vulnerability that allows remote attackers to view and modify administrative router settings by reading the HTML source code of the password.cgi file. iBallBaton150MWirelessRouter is a wireless router. The iBallBaton150MWirelessRouter has an authentication bypass vulnerability. An attacker could exploit the vulnerability to bypass the authentication mechanism and perform unauthorized operations. iBall Baton 150M Wireless Router is prone to a authentication-bypass vulnerability. This may lead to further attacks. \niBall Baton 150M Wireless Router 1.2.6 build 110401 Rel.47776n is vulnerable; other versions may also be affected. Devices using the following firmware and hardware are affected: firmware version 1.2.6 build 110401 Rel.47776n; hardware version iB-WRA150N v1 00000001",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "BID",
"id": "96822"
},
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "VULMON",
"id": "CVE-2017-6558"
}
],
"trust": 2.61
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-114761",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42591",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "VULMON",
"id": "CVE-2017-6558"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6558",
"trust": 3.5
},
{
"db": "BID",
"id": "96822",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201703-408",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-03186",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "42591",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "141522",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-114761",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-6558",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"db": "BID",
"id": "96822"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"id": "VAR-201703-1116",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "VULHUB",
"id": "VHN-114761"
}
],
"trust": 1.3306818
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
}
]
},
"last_update_date": "2025-04-20T23:22:25.499000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "iball Baton 150M Wireless-N Broadband Router",
"trust": 0.8,
"url": "http://www.iball.co.in/Product/150M-Wireless-N-Broadband-Router/539"
},
{
"title": "iBall-UTStar-CVEChecker",
"trust": 0.1,
"url": "https://github.com/GemGeorge/iBall-UTStar-CVEChecker "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/khulnasoft-lab/awesome-security "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-798",
"trust": 1.1
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/96822"
},
{
"trust": 1.8,
"url": "https://www.youtube.com/watch?v=8gzg1iusfcs"
},
{
"trust": 1.4,
"url": "http://seclists.org/fulldisclosure/2017/mar/22"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6558"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6558"
},
{
"trust": 0.3,
"url": "http://www.iball.co.in/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/798.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/42591/"
},
{
"trust": 0.1,
"url": "https://github.com/gemgeorge/iball-utstar-cvechecker"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"db": "BID",
"id": "96822"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"db": "VULHUB",
"id": "VHN-114761"
},
{
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"db": "BID",
"id": "96822"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-03-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"date": "2017-03-09T00:00:00",
"db": "VULHUB",
"id": "VHN-114761"
},
{
"date": "2017-03-09T00:00:00",
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"date": "2017-03-09T00:00:00",
"db": "BID",
"id": "96822"
},
{
"date": "2017-04-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"date": "2017-03-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"date": "2017-03-09T09:59:00.363000",
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-03-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-03186"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-114761"
},
{
"date": "2021-06-17T00:00:00",
"db": "VULMON",
"id": "CVE-2017-6558"
},
{
"date": "2017-03-16T03:02:00",
"db": "BID",
"id": "96822"
},
{
"date": "2017-04-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-002235"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201703-408"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-6558"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iBall Baton 150M iB-WRA150N Vulnerabilities that bypass authentication on devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-002235"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201703-408"
}
],
"trust": 0.6
}
}
VAR-201801-1286
Vulnerability from variot - Updated: 2024-11-23 22:52iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a hardcoded password of admin for the admin account, a hardcoded password of support for the support account, and a hardcoded password of user for the user account. iBall iB-WRA150N Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iBalliB-WRA150N is a wireless router product from iBall India. A hard-coded vulnerability exists in the iBalliB-WRA150N1.2.6build110401Rel.47776n version. An attacker could use this vulnerability to log in to the device. There is a security vulnerability in iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1286",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ib-wra150n",
"scope": "eq",
"trust": 1.6,
"vendor": "iball",
"version": "1.2.6"
},
{
"model": "ib-wra150n",
"scope": "eq",
"trust": 0.8,
"vendor": "iball",
"version": "1.2.6 build 110401 rel.47776n"
},
{
"model": "ib-wra150n build rel.47776n",
"scope": "eq",
"trust": 0.6,
"vendor": "iball",
"version": "1.2.6110401"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:iball:ib-wra150n_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
}
]
},
"cve": "CVE-2018-6387",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2018-6387",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-04190",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-136419",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2018-6387",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-6387",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2018-6387",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2018-04190",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-1056",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-136419",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2018-6387",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "VULHUB",
"id": "VHN-136419"
},
{
"db": "VULMON",
"id": "CVE-2018-6387"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a hardcoded password of admin for the admin account, a hardcoded password of support for the support account, and a hardcoded password of user for the user account. iBall iB-WRA150N Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iBalliB-WRA150N is a wireless router product from iBall India. A hard-coded vulnerability exists in the iBalliB-WRA150N1.2.6build110401Rel.47776n version. An attacker could use this vulnerability to log in to the device. There is a security vulnerability in iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-6387"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "VULHUB",
"id": "VHN-136419"
},
{
"db": "VULMON",
"id": "CVE-2018-6387"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-6387",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1056",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-04190",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-136419",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2018-6387",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "VULHUB",
"id": "VHN-136419"
},
{
"db": "VULMON",
"id": "CVE-2018-6387"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"id": "VAR-201801-1286",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "VULHUB",
"id": "VHN-136419"
}
],
"trust": 1.3363635999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
}
]
},
"last_update_date": "2024-11-23T22:52:13.975000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "iB-WRA150N",
"trust": 0.8,
"url": "https://www.iball.co.in/Product/150M-Wireless-N-ADSL2---Router/485"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-798",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136419"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "https://blogs.securiteam.com/index.php/archives/3654"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6387"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-6387"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/798.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "VULHUB",
"id": "VHN-136419"
},
{
"db": "VULMON",
"id": "CVE-2018-6387"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"db": "VULHUB",
"id": "VHN-136419"
},
{
"db": "VULMON",
"id": "CVE-2018-6387"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-03-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"date": "2018-01-29T00:00:00",
"db": "VULHUB",
"id": "VHN-136419"
},
{
"date": "2018-01-29T00:00:00",
"db": "VULMON",
"id": "CVE-2018-6387"
},
{
"date": "2018-03-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"date": "2018-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"date": "2018-01-29T18:29:00.283000",
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-03-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-04190"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULHUB",
"id": "VHN-136419"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULMON",
"id": "CVE-2018-6387"
},
{
"date": "2018-03-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001727"
},
{
"date": "2018-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1056"
},
{
"date": "2024-11-21T04:10:36.657000",
"db": "NVD",
"id": "CVE-2018-6387"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iBall iB-WRA150N Vulnerabilities related to the use of hard-coded credentials",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001727"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1056"
}
],
"trust": 0.6
}
}
VAR-201801-1287
Vulnerability from variot - Updated: 2024-11-23 22:34iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices allow remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping test arguments on the Diagnostics page. iBall iB-WRA150N The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iBalliB-WRA150N is a wireless router product from iBall India. A remote code execution vulnerability exists in the iBalliB-WRA150N1.2.6build110401Rel.47776n release. There is a security vulnerability in iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1287",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ib-wra150n",
"scope": "eq",
"trust": 1.6,
"vendor": "iball",
"version": "1.2.6"
},
{
"model": "ib-wra150n",
"scope": "eq",
"trust": 0.8,
"vendor": "iball",
"version": "1.2.6 build 110401 rel.47776n"
},
{
"model": "ib-wra150n build rel.47776n",
"scope": "eq",
"trust": 0.6,
"vendor": "iball",
"version": "1.2.6110401"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:iball:ib-wra150n_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
}
]
},
"cve": "CVE-2018-6388",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CVE-2018-6388",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2018-04192",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "VHN-136420",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2018-6388",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-6388",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2018-6388",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2018-04192",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-1055",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-136420",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "VULHUB",
"id": "VHN-136420"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices allow remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping test arguments on the Diagnostics page. iBall iB-WRA150N The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. iBalliB-WRA150N is a wireless router product from iBall India. A remote code execution vulnerability exists in the iBalliB-WRA150N1.2.6build110401Rel.47776n release. There is a security vulnerability in iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n version",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-6388"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "VULHUB",
"id": "VHN-136420"
}
],
"trust": 2.25
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-136420",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136420"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-6388",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1055",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-04192",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "44043",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-136420",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "VULHUB",
"id": "VHN-136420"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"id": "VAR-201801-1287",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "VULHUB",
"id": "VHN-136420"
}
],
"trust": 1.3363635999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
}
]
},
"last_update_date": "2024-11-23T22:34:25.177000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "iB-WRA150N",
"trust": 0.8,
"url": "https://www.iball.co.in/Product/150M-Wireless-N-ADSL2---Router/485"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136420"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://blogs.securiteam.com/index.php/archives/3654"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6388"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-6388"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "VULHUB",
"id": "VHN-136420"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"db": "VULHUB",
"id": "VHN-136420"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-03-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"date": "2018-01-29T00:00:00",
"db": "VULHUB",
"id": "VHN-136420"
},
{
"date": "2018-03-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"date": "2018-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"date": "2018-01-29T18:29:00.347000",
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-03-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-04192"
},
{
"date": "2018-02-15T00:00:00",
"db": "VULHUB",
"id": "VHN-136420"
},
{
"date": "2018-03-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001728"
},
{
"date": "2018-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1055"
},
{
"date": "2024-11-21T04:10:36.797000",
"db": "NVD",
"id": "CVE-2018-6388"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iBall iB-WRA150N In the device OS Command injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001728"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201801-1055"
}
],
"trust": 0.6
}
}
VAR-201707-1353
Vulnerability from variot - Updated: 2022-05-17 02:05The iBallBatoniB-WRA150N is a wireless router. iBallBatoniB-WRA150N has an unauthenticated DNS change vulnerability. An attacker could use this vulnerability to redirect to a potentially malicious site to perform malicious activity.
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201707-1353",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ib-wra150n",
"scope": null,
"trust": 0.6,
"vendor": "iball",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-14917",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "CNVD",
"id": "CNVD-2017-14917",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The iBallBatoniB-WRA150N is a wireless router. iBallBatoniB-WRA150N has an unauthenticated DNS change vulnerability. An attacker could use this vulnerability to redirect to a potentially malicious site to perform malicious activity.",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
],
"trust": 0.6
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "EXPLOITDB",
"id": "42192",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "42192",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2017-14917",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"id": "VAR-201707-1353",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
],
"trust": 1.2363636
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"last_update_date": "2022-05-17T02:05:50.534000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "https://www.exploit-db.com/exploits/42192/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-14917"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "iBall Baton iB-WRA150N Unauthenticated DNS Change Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-14917"
}
],
"trust": 0.6
}
}