Search criteria

14 vulnerabilities found for speedtouch by thomson

VAR-200708-0441

Vulnerability from variot - Updated: 2025-04-10 23:11

The Thomson ST 2030 SIP phone with software 1.52.1 allows remote attackers to cause a denial of service (device hang) via an INVITE message with a Via header that contains a '/' (slash) instead of the required space following the SIP version number. Thomson SpeedTouch 2030 is prone to a denial-of-service vulnerability because the device fails to handle specially crafted SIP INVITE messages. Exploiting this issue allows remote attackers to cause the device to stop responding, thus denying service to legitimate users. This issue affects Thomas SpeedTouch 2030 firmware 1.52.1; other versions may also be affected.


BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.

Download the free PSI BETA from the Secunia website: https://psi.secunia.com/


TITLE: Thomson SpeedTouch 2030 Denial of Service Vulnerability

SECUNIA ADVISORY ID: SA26587

VERIFY ADVISORY: http://secunia.com/advisories/26587/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: Thomson SpeedTouch 2030 VoIP Phone http://secunia.com/product/15497/

DESCRIPTION: A vulnerability has been reported in the Thomson SpeedTouch 2030 VoIP phone, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is reported in software version 1.52.1.

SOLUTION: Use the device in a trusted network environment only.

PROVIDED AND/OR DISCOVERED BY: Humberto J. Abdelnur, Radu State, and Olivier Festor

ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065433.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200708-0441",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "st 2030 sip phone",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "1"
      },
      {
        "model": "st 2030 sip phone",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "thomson",
        "version": "1.52.1"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "20301.52.1"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "25446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:thomson:st_2030_sip_phone",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Humberto J. Abdelnur, Radu State, and Olivier Festor are credited with the discovery of this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "25446"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2007-4553",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-4553",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-27915",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-4553",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-4553",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200708-419",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-27915",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Thomson ST 2030 SIP phone with software 1.52.1 allows remote attackers to cause a denial of service (device hang) via an INVITE message with a Via header that contains a \u0027/\u0027 (slash) instead of the required space following the SIP version number. Thomson SpeedTouch 2030 is prone to a denial-of-service vulnerability because the device fails to handle specially crafted SIP INVITE messages. \nExploiting this issue allows remote attackers to cause the device to stop responding, thus denying service to legitimate users. \nThis issue affects Thomas SpeedTouch 2030 firmware 1.52.1; other versions may also be affected. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nThomson SpeedTouch 2030 Denial of Service Vulnerability\n\nSECUNIA ADVISORY ID:\nSA26587\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26587/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nThomson SpeedTouch 2030 VoIP Phone\nhttp://secunia.com/product/15497/\n\nDESCRIPTION:\nA vulnerability has been reported in the Thomson SpeedTouch 2030 VoIP\nphone, which can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nThe vulnerability is reported in software version 1.52.1. \n\nSOLUTION:\nUse the device in a trusted network environment only. \n\nPROVIDED AND/OR DISCOVERED BY:\nHumberto J. Abdelnur, Radu State, and Olivier Festor\n\nORIGINAL ADVISORY:\nhttp://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065433.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "db": "BID",
        "id": "25446"
      },
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "db": "PACKETSTORM",
        "id": "58859"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-27915",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-4553",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "25446",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "26587",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-2988",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1018603",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "3075",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "36217",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20070823 DOS VULNERABILITY ON THOMSON SIP PHONE ST 2030 USING THE VIA HEADER",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "30530",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "4319",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-83912",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-27915",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "58859",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "db": "BID",
        "id": "25446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "db": "PACKETSTORM",
        "id": "58859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "id": "VAR-200708-0441",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-10T23:11:35.127000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://thomsonreuters.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065433.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/25446"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1018603"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26587"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/3075"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/2988"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36217"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4553"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4553"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/36217"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/2988"
      },
      {
        "trust": 0.3,
        "url": "http://www.thomsontelecompartner.com/en/products/viewabusinesssolution.php?id=87"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26587/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/15497/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "db": "BID",
        "id": "25446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "db": "PACKETSTORM",
        "id": "58859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "db": "BID",
        "id": "25446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "db": "PACKETSTORM",
        "id": "58859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-08-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "date": "2007-08-27T00:00:00",
        "db": "BID",
        "id": "25446"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "date": "2007-08-27T15:28:28",
        "db": "PACKETSTORM",
        "id": "58859"
      },
      {
        "date": "2007-08-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "date": "2007-08-28T00:17:00",
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-27915"
      },
      {
        "date": "2015-05-07T17:35:00",
        "db": "BID",
        "id": "25446"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      },
      {
        "date": "2007-10-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2007-4553"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson ST 2030 SIP Service disruption on telephones  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006035"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200708-419"
      }
    ],
    "trust": 0.6
  }
}

VAR-200711-0147

Vulnerability from variot - Updated: 2025-04-10 21:55

Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. BT Home Hub and Thomson/Alcatel Speedtouch 7G routers are prone to multiple web-interface vulnerabilities, including a cross-site request-forgery issue, a cross-site scripting issue, multiple HTML-injection issues, and multiple authentication-bypass issues. Successful exploits of many of these issues will allow an attacker to completely compromise the affected device. These issues affect the BT Home Hub and Thomson/Alcatel Speedtouch 7G routers.


2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.

Input passed to the "url" parameter in /cgi/b/ic/connect/ is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is reported in firmware version 5.4.0.14. Other versions may also be affected.

SOLUTION: Do not browse untrusted websites or follow untrusted links.

PROVIDED AND/OR DISCOVERED BY: Remco


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200711-0147",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "thomson",
        "version": "716"
      },
      {
        "model": "tg585 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "0"
      },
      {
        "model": "home hub .b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bt",
        "version": "6.2.6"
      },
      {
        "model": "home hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bt",
        "version": "6.2.2.6"
      },
      {
        "model": "home hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bt",
        "version": "0"
      },
      {
        "model": "speedtouch 7g",
        "scope": null,
        "trust": 0.3,
        "vendor": "alcatel",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "25972"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:thomson:speedtouch",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Adrian Pastor m123303@richmond.ac.uk",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-6003",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2007-6003",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-29365",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-6003",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-6003",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200711-243",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-29365",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. BT Home Hub and Thomson/Alcatel Speedtouch 7G routers are prone to multiple web-interface vulnerabilities, including a cross-site request-forgery issue, a cross-site scripting issue, multiple HTML-injection issues, and multiple authentication-bypass issues. \nSuccessful exploits of many of these issues will allow an attacker to completely compromise the affected device. \nThese issues affect the BT Home Hub and Thomson/Alcatel Speedtouch 7G routers. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nInput passed to the \"url\" parameter in /cgi/b/ic/connect/ is not\nproperly sanitised before being returned to the user. This can be\nexploited to execute arbitrary HTML and script code in a user\u0027s\nbrowser session in context of an affected site. \n\nThe vulnerability is reported in firmware version 5.4.0.14. Other\nversions may also be affected. \n\nSOLUTION:\nDo not browse untrusted websites or follow untrusted links. \n\nPROVIDED AND/OR DISCOVERED BY:\nRemco\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "BID",
        "id": "25972"
      },
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "db": "PACKETSTORM",
        "id": "61021"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-29365",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-6003",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "27564",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "38419",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "25972",
        "trust": 0.3
      },
      {
        "db": "EXPLOIT-DB",
        "id": "30882",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-84240",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-29365",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "61021",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "db": "BID",
        "id": "25972"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "PACKETSTORM",
        "id": "61021"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "id": "VAR-200711-0147",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      }
    ],
    "trust": 0.975
  },
  "last_update_date": "2025-04-10T21:55:46.753000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SpeedTouch",
        "trust": 0.8,
        "url": "http://www.technicolor.com/en/hi/about-technicolor/technicolor-at-a-glance/technicolor-s-other-brands/tab/thomson"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/27564"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6003"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6003"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/38419"
      },
      {
        "trust": 0.3,
        "url": "http://www.homehub.bt.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/"
      },
      {
        "trust": 0.3,
        "url": "http://www.gnucitizen.org/blog/call-jacking"
      },
      {
        "trust": 0.3,
        "url": "http://www.thomson.net/en/home/minisites/bap/telecom/subcategory.html?category=dsl%20modems"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/481835"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/486081"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/517314"
      },
      {
        "trust": 0.3,
        "url": "http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/16520/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27564/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "db": "BID",
        "id": "25972"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "PACKETSTORM",
        "id": "61021"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "db": "BID",
        "id": "25972"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "db": "PACKETSTORM",
        "id": "61021"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-11-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "date": "2007-10-08T00:00:00",
        "db": "BID",
        "id": "25972"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "date": "2007-11-20T16:17:55",
        "db": "PACKETSTORM",
        "id": "61021"
      },
      {
        "date": "2007-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "date": "2007-11-15T22:46:00",
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-29365"
      },
      {
        "date": "2011-04-04T20:05:00",
        "db": "BID",
        "id": "25972"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      },
      {
        "date": "2007-11-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2007-6003"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch 716 of  cgi/b/ic/connect Vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-006334"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "61021"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200711-243"
      }
    ],
    "trust": 0.7
  }
}

VAR-200603-0482

Vulnerability from variot - Updated: 2025-04-03 22:21

Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page. The SpeedTouch 500 series are prone to a cross-site scripting vulnerability. This issue is due to a failure in the devices to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the compromise of the device

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200603-0482",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "576_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "530_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "536_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "546_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "516_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "585_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "580_5.3.2.6.0"
      },
      {
        "model": "thomson 516 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 530 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 536 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 546 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 576 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 580 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 585 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5855.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5805.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5765.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5465.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5365.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5305.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5165.3.2.6.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Preben Nyl?kken is credited with the discovery of this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2006-0946",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2006-0946",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2006-1160",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-17054",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-0946",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-1160",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200602-430",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-17054",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page. The SpeedTouch 500 series are prone to a cross-site scripting vulnerability. This issue is due to a failure in the devices to properly sanitize user-supplied input. \nAn attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the compromise of the device",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-17054",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "16839",
        "trust": 2.6
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0946",
        "trust": 2.3
      },
      {
        "db": "SECUNIA",
        "id": "19069",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0765",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015688",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "23527",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20060226 THOMSON SPEEDTOUCH 500 MODEMS VULNERABLE TO XSS",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "24977",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "27320",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-80933",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "id": "VAR-200603-0482",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      }
    ],
    "trust": 1.676190457142857
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      }
    ]
  },
  "last_update_date": "2025-04-03T22:21:41.753000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/16839"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/426186"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/23527"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015688"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/19069"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/0765"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/24977"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0765"
      },
      {
        "trust": 0.3,
        "url": "http://www.speedtouchdsl.com/homeprod_dsl.htm"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/426186"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17054"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "date": "2006-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17054"
      },
      {
        "date": "2006-02-25T00:00:00",
        "db": "BID",
        "id": "16839"
      },
      {
        "date": "2006-02-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "date": "2006-03-01T02:02:00",
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17054"
      },
      {
        "date": "2006-03-01T05:16:00",
        "db": "BID",
        "id": "16839"
      },
      {
        "date": "2006-03-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2006-0946"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch Cross-Site Scripting Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1160"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-430"
      }
    ],
    "trust": 0.6
  }
}

VAR-200603-0483

Vulnerability from variot - Updated: 2025-04-03 22:21

Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the "31" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface. The SpeedTouch 500 series are prone to a cross-site scripting vulnerability. This issue is due to a failure in the devices to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the compromise of the device

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200603-0483",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "576_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "530_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "536_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "546_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "516_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "585_5.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "580_5.3.2.6.0"
      },
      {
        "model": "thomson 516 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 530 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 536 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 546 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 576 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 580 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "thomson 585 5.3.2.6.0",
        "scope": null,
        "trust": 0.6,
        "vendor": "speedtouch",
        "version": null
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5855.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5805.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5765.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5465.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5365.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5305.3.2.6.0"
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "5165.3.2.6.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Preben Nyl?kken is credited with the discovery of this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2006-0947",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-0947",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2006-1177",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-17055",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-0947",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-1177",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200602-411",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-17055",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the \"31\" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface. The SpeedTouch 500 series are prone to a cross-site scripting vulnerability. This issue is due to a failure in the devices to properly sanitize user-supplied input. \nAn attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the compromise of the device",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-17055",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "16839",
        "trust": 2.6
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0947",
        "trust": 2.3
      },
      {
        "db": "SECUNIA",
        "id": "19069",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0765",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015688",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20060226 THOMSON SPEEDTOUCH 500 MODEMS VULNERABLE TO XSS",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "27319",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-80932",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "id": "VAR-200603-0483",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      }
    ],
    "trust": 1.676190457142857
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      }
    ]
  },
  "last_update_date": "2025-04-03T22:21:41.723000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/16839"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/426186"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015688"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/19069"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/0765"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0765"
      },
      {
        "trust": 0.3,
        "url": "http://www.speedtouchdsl.com/homeprod_dsl.htm"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/426186"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17055"
      },
      {
        "db": "BID",
        "id": "16839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "date": "2006-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17055"
      },
      {
        "date": "2006-02-25T00:00:00",
        "db": "BID",
        "id": "16839"
      },
      {
        "date": "2006-02-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "date": "2006-03-01T02:02:00",
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-02-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "date": "2011-03-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17055"
      },
      {
        "date": "2006-03-01T05:16:00",
        "db": "BID",
        "id": "16839"
      },
      {
        "date": "2006-03-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2006-0947"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch 500 Series Cross-Site Scripting Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-1177"
      },
      {
        "db": "BID",
        "id": "16839"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-411"
      }
    ],
    "trust": 0.6
  }
}

VAR-200408-0052

Vulnerability from variot - Updated: 2025-04-03 19:55

Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. The ability to predict TCP sequence numbers may allow a remote attacker to inject packets into a vulnerable data stream, for example the telnet service on the affected modem. Remote attackers can use this vulnerability to carry out TCP communication forgery attacks. The TCP initialization sequence number of the device can be guessed, which can cause the attacker to fail the ADSL Modem communication by forging the communication, or hijack the device. BACKGROUND

The Thompson (formerly Alcatel) SpeedTouch is an ADSL router for home and business providing a continuously available, "always on," connection. More information about the product can be found at http://www.speedtouchdsl.com/.

II.

The problem specifically exists due to the predictable nature of the TCP Initial Sequence Number (ISN) generator on the device. The following sanitized tcpdump output demonstrates the existence of the vulnerability when 10 consecutive TCP connection requests are generated for the telnet server (port 23) on the Thompson device:

48.3 host_a.1096 > host_b.telnet: S 48.3 host_b.telnet > host_a.1096: S 4081040897:4081040897(0) ack 48.3 host_a.1096 > host_b.telnet: R 48.4 host_a.1096 > host_b.telnet: S 48.4 host_b.telnet > host_a.1096: S 4081104897:4081104897(0) ack 48.4 host_a.1096 > host_b.telnet: R 48.6 host_a.1096 > host_b.telnet: S 48.6 host_b.telnet > host_a.1096: S 4081232897:4081232897(0) ack 48.6 host_a.1096 > host_b.telnet: R 48.7 host_a.1096 > host_b.telnet: S 48.7 host_b.telnet > host_a.1096: S 4081296897:4081296897(0) ack 48.7 host_a.1096 > host_b.telnet: R 48.9 host_a.1096 > host_b.telnet: S 48.9 host_b.telnet > host_a.1096: S 4081360897:4081360897(0) ack 48.9 host_a.1096 > host_b.telnet: R 49.0 host_a.1096 > host_b.telnet: S 49.0 host_b.telnet > host_a.1096: S 4081488897:4081488897(0) ack 49.0 host_a.1096 > host_b.telnet: R 49.2 host_a.1096 > host_b.telnet: S 49.2 host_b.telnet > host_a.1096: S 4081552897:4081552897(0) ack 49.2 host_a.1096 > host_b.telnet: R 49.3 host_a.1096 > host_b.telnet: S 49.3 host_b.telnet > host_a.1096: S 4081616897:4081616897(0) ack 49.3 host_a.1096 > host_b.telnet: R 49.5 host_a.1096 > host_b.telnet: S 49.5 host_b.telnet > host_a.1096: S 4081744897:4081744897(0) ack 49.5 host_a.1096 > host_b.telnet: R 49.6 host_a.1096 > host_b.telnet: S 49.6 host_b.telnet > host_a.1096: S 4081808897:4081808897(0) ack 49.6 host_a.1096 > host_b.telnet: R

In the above example, host_a is the querying host and host_b is the Thompson device. A clear pattern in ISN generation can be seen as the value increases by approximately 64,000 each millisecond.

III. ANALYSIS

Successful exploitation of weak ISNs for the purpose of connection spoofing is not a trivial task. Successful exploitation allows an attacker to generate traffic on behalf of the affected device. Such an ability is most dangerous when trust paths exist between the affected device and another remote system.

IV. DETECTION

iDEFENSE has verified the existence of this vulnerability in Thompson's SpeedTouch firmware version GV8BAA3.270 (1003825). It is suspected that earlier versions are susceptible to exploitation as well.

V. WORKAROUNDS

Untrusted traffic should be filtered at the network perimeter.

VI. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2004-0641 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

VII. DISCLOSURE TIMELINE

06/08/04 Initial vendor contact - no response 06/08/04 iDEFENSE clients notified 06/18/04 Secondary vendor contact - no response 08/05/04 Public disclosure

VIII. CREDIT

The discoverer wishes to remain anonymous.

Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp

IX. LEGAL NOTICES

Copyright © 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200408-0052",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "thomson",
        "version": "510_adsl_router"
      },
      {
        "model": "speedtouch adsl router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "510"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "10881"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "iDEFENSE",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0641",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0641",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-9071",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0641",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200408-015",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9071",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. The ability to predict TCP sequence numbers may allow a remote attacker to inject packets into a vulnerable data stream, for example the telnet service on the affected modem. Remote attackers can use this vulnerability to carry out TCP communication forgery attacks. The TCP initialization sequence number of the device can be guessed, which can cause the attacker to fail the ADSL Modem communication by forging the communication, or hijack the device. BACKGROUND\n\nThe Thompson (formerly Alcatel) SpeedTouch is an ADSL router for home\nand business providing a continuously available, \"always on,\"\nconnection. More information about the product can be found at\nhttp://www.speedtouchdsl.com/. \n\nII. \n\nThe problem specifically exists due to the predictable nature of the TCP\nInitial Sequence Number (ISN) generator on the device. The following\nsanitized tcpdump output demonstrates the existence of the vulnerability\nwhen 10 consecutive TCP connection requests are generated for the telnet\nserver (port 23) on the Thompson device:\n\n48.3 host_a.1096   \u003e host_b.telnet: S\n48.3 host_b.telnet \u003e host_a.1096: S 4081040897:4081040897(0) ack\n48.3 host_a.1096   \u003e host_b.telnet: R\n48.4 host_a.1096   \u003e host_b.telnet: S\n48.4 host_b.telnet \u003e host_a.1096: S 4081104897:4081104897(0) ack\n48.4 host_a.1096   \u003e host_b.telnet: R\n48.6 host_a.1096   \u003e host_b.telnet: S\n48.6 host_b.telnet \u003e host_a.1096: S 4081232897:4081232897(0) ack\n48.6 host_a.1096   \u003e host_b.telnet: R\n48.7 host_a.1096   \u003e host_b.telnet: S\n48.7 host_b.telnet \u003e host_a.1096: S 4081296897:4081296897(0) ack\n48.7 host_a.1096   \u003e host_b.telnet: R\n48.9 host_a.1096   \u003e host_b.telnet: S\n48.9 host_b.telnet \u003e host_a.1096: S 4081360897:4081360897(0) ack\n48.9 host_a.1096   \u003e host_b.telnet: R\n49.0 host_a.1096   \u003e host_b.telnet: S\n49.0 host_b.telnet \u003e host_a.1096: S 4081488897:4081488897(0) ack\n49.0 host_a.1096   \u003e host_b.telnet: R\n49.2 host_a.1096   \u003e host_b.telnet: S\n49.2 host_b.telnet \u003e host_a.1096: S 4081552897:4081552897(0) ack\n49.2 host_a.1096   \u003e host_b.telnet: R\n49.3 host_a.1096   \u003e host_b.telnet: S\n49.3 host_b.telnet \u003e host_a.1096: S 4081616897:4081616897(0) ack\n49.3 host_a.1096   \u003e host_b.telnet: R\n49.5 host_a.1096   \u003e host_b.telnet: S\n49.5 host_b.telnet \u003e host_a.1096: S 4081744897:4081744897(0) ack\n49.5 host_a.1096   \u003e host_b.telnet: R\n49.6 host_a.1096   \u003e host_b.telnet: S\n49.6 host_b.telnet \u003e host_a.1096: S 4081808897:4081808897(0) ack\n49.6 host_a.1096   \u003e host_b.telnet: R\n\nIn the above example, host_a is the querying host and host_b is the\nThompson device. A clear pattern in ISN generation can be seen as the\nvalue increases by approximately 64,000 each millisecond. \n\nIII. ANALYSIS\n\nSuccessful exploitation of weak ISNs for the purpose of connection\nspoofing is not a trivial task. Successful exploitation allows an\nattacker to generate traffic on behalf of the affected device. Such an\nability is most dangerous when trust paths exist between the affected\ndevice and another remote system. \n\nIV. DETECTION\n\niDEFENSE has verified the existence of this vulnerability in Thompson\u0027s\nSpeedTouch firmware version GV8BAA3.270 (1003825). It is suspected that\nearlier versions are susceptible to exploitation as well. \n\nV. WORKAROUNDS\n\nUntrusted traffic should be filtered at the network perimeter. \n\nVI. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CAN-2004-0641 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org), which standardizes names for\nsecurity problems. \n\nVII. DISCLOSURE TIMELINE\n\n06/08/04   Initial vendor contact - no response\n06/08/04   iDEFENSE clients notified\n06/18/04   Secondary vendor contact - no response\n08/05/04   Public disclosure\n\nVIII. CREDIT\n\nThe discoverer wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nIX. LEGAL NOTICES\n\nCopyright \u00a9 2004 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      },
      {
        "db": "BID",
        "id": "10881"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "db": "PACKETSTORM",
        "id": "33975"
      }
    ],
    "trust": 1.35
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-9071",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0641",
        "trust": 2.1
      },
      {
        "db": "BID",
        "id": "10881",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "12238",
        "trust": 1.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2004.0504",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015",
        "trust": 0.7
      },
      {
        "db": "IDEFENSE",
        "id": "20040805 THOMPSON SPEEDTOUCH HOME ADSL MODEM PREDICTABLE TCP ISN GENERATION",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16919",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "33975",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "19522",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-9071",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "db": "BID",
        "id": "10881"
      },
      {
        "db": "PACKETSTORM",
        "id": "33975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "id": "VAR-200408-0052",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T19:55:42.900000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.auscert.org.au/render.html?it=4299"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/10881"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/12238/"
      },
      {
        "trust": 1.6,
        "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16919"
      },
      {
        "trust": 0.3,
        "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities"
      },
      {
        "trust": 0.3,
        "url": "http://www.speedtouch.com/"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=120\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org),"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/poi/teams/vcp.jsp"
      },
      {
        "trust": 0.1,
        "url": "http://www.speedtouchdsl.com/."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0641"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "db": "BID",
        "id": "10881"
      },
      {
        "db": "PACKETSTORM",
        "id": "33975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "db": "BID",
        "id": "10881"
      },
      {
        "db": "PACKETSTORM",
        "id": "33975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-08-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "date": "2004-08-05T00:00:00",
        "db": "BID",
        "id": "10881"
      },
      {
        "date": "2004-08-06T18:58:41",
        "db": "PACKETSTORM",
        "id": "33975"
      },
      {
        "date": "2004-08-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "date": "2004-08-05T04:00:00",
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9071"
      },
      {
        "date": "2009-07-12T06:16:00",
        "db": "BID",
        "id": "10881"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2004-0641"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "33975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch Home ADSL Modem predictable TCP Serial number vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "10881"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-015"
      }
    ],
    "trust": 0.9
  }
}

VAR-200804-0458

Vulnerability from variot - Updated: 2022-05-17 01:56

Both BT Home Hub and Speedtouch are home wireless Internet routers. The default WEP/WPA key algorithm used by BT Home Hub and Speedtouch routers is predictable, and remote attackers can predict keys based on some public information (such as MAC address or SSID) so that they can completely invade the router. For Speedtouch router router: S/N: CP0615JT109 (53) Delete CC and PP values: CP0615109 converts XXX value to hexadecimal: CP0615313039 through SHA-1 processing: 742da831d2b657fa53d347301ec610e1ebf8a3d0 converts the last 3 bytes into 6-byte characters The string, then added to SpeedTouch, becomes the default SSID: SpeedTouchF8A3D0 converts the first 5 bytes into a 10-byte string and becomes the default WEP/WPA key: 742DA831D2 for BT Home Hub, the only difference is Use the last 2 bytes of the SHA1 hash to get the SSID: S/N: CP0647EH6DM (BF) Delete CC and PP values: CP06476DM16 encoding XXX: CP064736444DSHA1 encryption: 06f48a28eba1ab896a396077d772fd65503b8df3 Default SSID: BTHomeHub-8DF3 default encryption key: 06f48a28eb. Multiple wireless routers are prone to a vulnerability that can allow an attacker to predict their default WEP/WPA encryption keys. Attackers can exploit this issue to bypass authentication to an affected device, which can allow them to completely compromise the device or to gain access to the private network

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200804-0458",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "no",
        "version": null
      },
      {
        "model": "speedtouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "thomson",
        "version": "0"
      },
      {
        "model": "home hub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bt",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kevin Devine",
    "sources": [
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.3
  },
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2008-2093",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "CNVD",
            "id": "CNVD-2008-2093",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Both BT Home Hub and Speedtouch are home wireless Internet routers. The default WEP/WPA key algorithm used by BT Home Hub and Speedtouch routers is predictable, and remote attackers can predict keys based on some public information (such as MAC address or SSID) so that they can completely invade the router. For Speedtouch router router: S/N: CP0615JT109 (53) Delete CC and PP values: CP0615109 converts XXX value to hexadecimal: CP0615313039 through SHA-1 processing: 742da831d2b657fa53d347301ec610e1ebf8a3d0 converts the last 3 bytes into 6-byte characters The string, then added to SpeedTouch, becomes the default SSID: SpeedTouchF8A3D0 converts the first 5 bytes into a 10-byte string and becomes the default WEP/WPA key: 742DA831D2 for BT Home Hub, the only difference is Use the last 2 bytes of the SHA1 hash to get the SSID: S/N: CP0647EH6DM (BF) Delete CC and PP values: CP06476DM16 encoding XXX: CP064736444DSHA1 encryption: 06f48a28eba1ab896a396077d772fd65503b8df3 Default SSID: BTHomeHub-8DF3 default encryption key: 06f48a28eb. Multiple wireless routers are prone to a vulnerability that can allow an attacker to predict their default WEP/WPA encryption keys. \nAttackers can exploit this issue to bypass authentication to an affected device, which can allow them to completely compromise the device or to gain access to the private network",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.81
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "28893",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "id": "VAR-200804-0458",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ]
  },
  "last_update_date": "2022-05-17T01:56:45.983000Z",
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 0.6,
        "url": "http://marc.info/?l=bugtraq\u0026m=120890136725340\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.homehub.bt.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/"
      },
      {
        "trust": 0.3,
        "url": "http://www.thomson-broadband.co.uk/codepages/content.asp?c=1"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/491206"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-04-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "date": "2008-04-22T00:00:00",
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      },
      {
        "date": "2008-04-23T16:47:00",
        "db": "BID",
        "id": "28893"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thomson SpeedTouch and BT Home Hub Router Default WEP/WPA Key Algorithm Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-2093"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "28893"
      }
    ],
    "trust": 0.3
  }
}

CVE-2007-6003 (GCVE-0-2007-6003)

Vulnerability from cvelistv5 – Published: 2007-11-16 03:00 – Updated: 2024-08-07 15:47
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/27564 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:47:00.812Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "speedtouch-url-xss(38419)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
          },
          {
            "name": "27564",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27564"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-11-12T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T16:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "speedtouch-url-xss(38419)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
        },
        {
          "name": "27564",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27564"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6003",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "speedtouch-url-xss(38419)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
            },
            {
              "name": "27564",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27564"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6003",
    "datePublished": "2007-11-16T03:00:00.000Z",
    "dateReserved": "2007-11-15T05:00:00.000Z",
    "dateUpdated": "2024-08-07T15:47:00.812Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0946 (GCVE-0-2006-0946)

Vulnerability from cvelistv5 – Published: 2006-03-01 07:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1015688 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/16839 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2006/0765 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/426186 mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/23527 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/19069 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:56:14.176Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015688",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015688"
          },
          {
            "name": "16839",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16839"
          },
          {
            "name": "ADV-2006-0765",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0765"
          },
          {
            "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/426186"
          },
          {
            "name": "23527",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23527"
          },
          {
            "name": "19069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19069"
          },
          {
            "name": "speedtouch-localnetwork-xss(24977)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-26T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T19:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015688",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015688"
        },
        {
          "name": "16839",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16839"
        },
        {
          "name": "ADV-2006-0765",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0765"
        },
        {
          "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/426186"
        },
        {
          "name": "23527",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23527"
        },
        {
          "name": "19069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19069"
        },
        {
          "name": "speedtouch-localnetwork-xss(24977)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0946",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015688",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015688"
            },
            {
              "name": "16839",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16839"
            },
            {
              "name": "ADV-2006-0765",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0765"
            },
            {
              "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/426186"
            },
            {
              "name": "23527",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23527"
            },
            {
              "name": "19069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19069"
            },
            {
              "name": "speedtouch-localnetwork-xss(24977)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0946",
    "datePublished": "2006-03-01T07:00:00.000Z",
    "dateReserved": "2006-03-01T05:00:00.000Z",
    "dateUpdated": "2024-08-07T16:56:14.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0947 (GCVE-0-2006-0947)

Vulnerability from cvelistv5 – Published: 2006-03-01 07:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the "31" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1015688 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/16839 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2006/0765 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/426186 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/19069 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:56:14.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015688",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015688"
          },
          {
            "name": "16839",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16839"
          },
          {
            "name": "ADV-2006-0765",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0765"
          },
          {
            "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/426186"
          },
          {
            "name": "19069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19069"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-26T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the \"31\" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T15:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015688",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015688"
        },
        {
          "name": "16839",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16839"
        },
        {
          "name": "ADV-2006-0765",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0765"
        },
        {
          "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/426186"
        },
        {
          "name": "19069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19069"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the \"31\" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015688",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015688"
            },
            {
              "name": "16839",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16839"
            },
            {
              "name": "ADV-2006-0765",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0765"
            },
            {
              "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/426186"
            },
            {
              "name": "19069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19069"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0947",
    "datePublished": "2006-03-01T07:00:00.000Z",
    "dateReserved": "2006-03-01T05:00:00.000Z",
    "dateUpdated": "2024-08-07T16:56:14.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-0641 (GCVE-0-2004-0641)

Vulnerability from cvelistv5 – Published: 2005-04-14 08:00 – Updated: 2024-08-08 00:24
VLAI?
Summary
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.auscert.org.au/render.html?it=4299 third-party-advisoryx_refsource_AUSCERT
http://www.securityfocus.com/bid/10881 vdb-entryx_refsource_BID
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
http://secunia.com/advisories/12238/ third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "speedtouch-hijack-connection(16919)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
          },
          {
            "name": "ESB-2004.0504",
            "tags": [
              "third-party-advisory",
              "x_refsource_AUSCERT",
              "x_transferred"
            ],
            "url": "http://www.auscert.org.au/render.html?it=4299"
          },
          {
            "name": "10881",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10881"
          },
          {
            "name": "20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "12238",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12238/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-08-05T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "speedtouch-hijack-connection(16919)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
        },
        {
          "name": "ESB-2004.0504",
          "tags": [
            "third-party-advisory",
            "x_refsource_AUSCERT"
          ],
          "url": "http://www.auscert.org.au/render.html?it=4299"
        },
        {
          "name": "10881",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10881"
        },
        {
          "name": "20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "12238",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12238/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0641",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "speedtouch-hijack-connection(16919)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
            },
            {
              "name": "ESB-2004.0504",
              "refsource": "AUSCERT",
              "url": "http://www.auscert.org.au/render.html?it=4299"
            },
            {
              "name": "10881",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10881"
            },
            {
              "name": "20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "12238",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12238/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0641",
    "datePublished": "2005-04-14T08:00:00.000Z",
    "dateReserved": "2004-07-08T04:00:00.000Z",
    "dateUpdated": "2024-08-08T00:24:26.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6003 (GCVE-0-2007-6003)

Vulnerability from nvd – Published: 2007-11-16 03:00 – Updated: 2024-08-07 15:47
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/27564 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:47:00.812Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "speedtouch-url-xss(38419)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
          },
          {
            "name": "27564",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27564"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-11-12T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T16:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "speedtouch-url-xss(38419)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
        },
        {
          "name": "27564",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27564"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6003",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "speedtouch-url-xss(38419)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38419"
            },
            {
              "name": "27564",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27564"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6003",
    "datePublished": "2007-11-16T03:00:00.000Z",
    "dateReserved": "2007-11-15T05:00:00.000Z",
    "dateUpdated": "2024-08-07T15:47:00.812Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0946 (GCVE-0-2006-0946)

Vulnerability from nvd – Published: 2006-03-01 07:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1015688 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/16839 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2006/0765 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/426186 mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/23527 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/19069 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:56:14.176Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015688",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015688"
          },
          {
            "name": "16839",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16839"
          },
          {
            "name": "ADV-2006-0765",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0765"
          },
          {
            "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/426186"
          },
          {
            "name": "23527",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23527"
          },
          {
            "name": "19069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19069"
          },
          {
            "name": "speedtouch-localnetwork-xss(24977)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-26T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T19:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015688",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015688"
        },
        {
          "name": "16839",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16839"
        },
        {
          "name": "ADV-2006-0765",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0765"
        },
        {
          "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/426186"
        },
        {
          "name": "23527",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23527"
        },
        {
          "name": "19069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19069"
        },
        {
          "name": "speedtouch-localnetwork-xss(24977)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0946",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Thomson SpeedTouch modems running firmware 5.3.2.6.0 allows remote attackers to inject arbitrary web script or HTML via the name parameter to the LocalNetwork page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015688",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015688"
            },
            {
              "name": "16839",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16839"
            },
            {
              "name": "ADV-2006-0765",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0765"
            },
            {
              "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/426186"
            },
            {
              "name": "23527",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23527"
            },
            {
              "name": "19069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19069"
            },
            {
              "name": "speedtouch-localnetwork-xss(24977)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24977"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0946",
    "datePublished": "2006-03-01T07:00:00.000Z",
    "dateReserved": "2006-03-01T05:00:00.000Z",
    "dateUpdated": "2024-08-07T16:56:14.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0947 (GCVE-0-2006-0947)

Vulnerability from nvd – Published: 2006-03-01 07:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the "31" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1015688 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/16839 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2006/0765 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/426186 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/19069 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:56:14.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015688",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015688"
          },
          {
            "name": "16839",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16839"
          },
          {
            "name": "ADV-2006-0765",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0765"
          },
          {
            "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/426186"
          },
          {
            "name": "19069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19069"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-26T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the \"31\" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T15:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015688",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015688"
        },
        {
          "name": "16839",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16839"
        },
        {
          "name": "ADV-2006-0765",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0765"
        },
        {
          "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/426186"
        },
        {
          "name": "19069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19069"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0947",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Thomson SpeedTouch modem running firmware 5.3.2.6.0 allows remote attackers to create users that cannot be deleted via scripting code in the \"31\" parameter in a NewUser function, which is not filtered by the modem when creating the account, but cannot be deleted by the administrator, possibly due to cleansing that occurs in the administrator interface."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015688",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015688"
            },
            {
              "name": "16839",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16839"
            },
            {
              "name": "ADV-2006-0765",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0765"
            },
            {
              "name": "20060226 Thomson SpeedTouch 500 modems vulnerable to XSS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/426186"
            },
            {
              "name": "19069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19069"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0947",
    "datePublished": "2006-03-01T07:00:00.000Z",
    "dateReserved": "2006-03-01T05:00:00.000Z",
    "dateUpdated": "2024-08-07T16:56:14.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-0641 (GCVE-0-2004-0641)

Vulnerability from nvd – Published: 2005-04-14 08:00 – Updated: 2024-08-08 00:24
VLAI?
Summary
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.auscert.org.au/render.html?it=4299 third-party-advisoryx_refsource_AUSCERT
http://www.securityfocus.com/bid/10881 vdb-entryx_refsource_BID
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
http://secunia.com/advisories/12238/ third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "speedtouch-hijack-connection(16919)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
          },
          {
            "name": "ESB-2004.0504",
            "tags": [
              "third-party-advisory",
              "x_refsource_AUSCERT",
              "x_transferred"
            ],
            "url": "http://www.auscert.org.au/render.html?it=4299"
          },
          {
            "name": "10881",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10881"
          },
          {
            "name": "20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
          },
          {
            "name": "12238",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12238/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-08-05T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T18:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "speedtouch-hijack-connection(16919)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
        },
        {
          "name": "ESB-2004.0504",
          "tags": [
            "third-party-advisory",
            "x_refsource_AUSCERT"
          ],
          "url": "http://www.auscert.org.au/render.html?it=4299"
        },
        {
          "name": "10881",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10881"
        },
        {
          "name": "20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
        },
        {
          "name": "12238",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12238/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0641",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "speedtouch-hijack-connection(16919)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16919"
            },
            {
              "name": "ESB-2004.0504",
              "refsource": "AUSCERT",
              "url": "http://www.auscert.org.au/render.html?it=4299"
            },
            {
              "name": "10881",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10881"
            },
            {
              "name": "20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=120\u0026type=vulnerabilities\u0026flashstatus=true"
            },
            {
              "name": "12238",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12238/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0641",
    "datePublished": "2005-04-14T08:00:00.000Z",
    "dateReserved": "2004-07-08T04:00:00.000Z",
    "dateUpdated": "2024-08-08T00:24:26.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}