VAR-200203-0075

Vulnerability from variot - Updated: 2025-04-03 22:24

Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26, when configured to block traffic below port 1024, allows remote attackers to cause a denial of service (hang) via a port scan of the WAN port. The Netgear RP114 Cable / DSL Web Safe router allows some users to share cable / DSL connections and provides address translation capabilities. A similar situation may occur in other configuration situations, and it may be the problem for all routers with firmware versions earlier than 3.26. All incoming/outgoing communication across the WAN port will cease for the duration of the port scan. This condition has reportedly also been reproduced with other configurations. This issue may affect firmware releases other than v3.26. < Link: http://archives.neohapsis.com/archives/bugtraq/2002-01/0183.html >

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200203-0075",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rp114",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "netgear",
        "version": "3.26"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "none",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "db": "BID",
        "id": "3876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "This vulnerability was submitted to BugTraq on January 15th, 2002 by \"Omkhar Arasaratnam\" \u003comkhar@rogers.com\u003e.",
    "sources": [
      {
        "db": "BID",
        "id": "3876"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2002-0127",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-0127",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-4522",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-0127",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200203-085",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-4522",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4522"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26, when configured to block traffic below port 1024, allows remote attackers to cause a denial of service (hang) via a port scan of the WAN port. The Netgear RP114 Cable / DSL Web Safe router allows some users to share cable / DSL connections and provides address translation capabilities. A similar situation may occur in other configuration situations, and it may be the problem for all routers with firmware versions earlier than 3.26. All incoming/outgoing communication across the WAN port will cease for the duration of the port scan. \nThis condition has reportedly also been reproduced with other configurations. This issue may affect firmware releases other than v3.26. \u003c *Link: http://archives.neohapsis.com/archives/bugtraq/2002-01/0183.html* \u003e",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "db": "BID",
        "id": "3876"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4522"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2002-0127",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "3876",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2002-0071",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20020115 VULNERABILITY NETGEAR RP-114 ROUTER - NMAP CAUSES DOS",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-4522",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4522"
      },
      {
        "db": "BID",
        "id": "3876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "id": "VAR-200203-0075",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4522"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:24:16.480000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/3876"
      },
      {
        "trust": 1.7,
        "url": "http://online.securityfocus.com/archive/1/250405"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com/product_view.asp?xrp=4\u0026yrp=12\u0026zrp=93"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4522"
      },
      {
        "db": "BID",
        "id": "3876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4522"
      },
      {
        "db": "BID",
        "id": "3876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-01-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "date": "2002-03-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4522"
      },
      {
        "date": "2002-01-15T00:00:00",
        "db": "BID",
        "id": "3876"
      },
      {
        "date": "2002-01-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "date": "2002-03-25T05:00:00",
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-01-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "date": "2008-11-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4522"
      },
      {
        "date": "2009-07-11T09:56:00",
        "db": "BID",
        "id": "3876"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2002-0127"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "NetGear RP114 Router WAN Interface Remote Denial of Service Attack Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2002-0071"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200203-085"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…