VAR-201404-0472
Vulnerability from variot - Updated: 2025-04-13 23:18The ZyXEL Wireless N300 NetUSB NBG-419N router with firmware 1.00(BFQ.6)C0 allows remote attackers to execute arbitrary code via shell metacharacters in input to the (1) detectWeather, (2) set_language, (3) SystemCommand, or (4) NTPSyncWithHost function in management.c, or a (5) SET COUNTRY, (6) SET WLAN SSID, (7) SET WLAN CHANNEL, (8) SET WLAN STATUS, or (9) SET WLAN COUNTRY udps command. ZyXEL Wireless N300 NetUSB Router NBG-419N running firmware version 1.00(BFQ.6)C0, and possibly earlier versions, is susceptible to multiple vulnerabilities. Other device models that use similar firmware may also be vulnerable. ZyXEL Wireless N300 NetUSB Router NBG-419N is a router device. The detectWeather(), set_language(), SystemCommand(), and NTPSyncWithHost() functions in the ZyXEL Wireless N300 NetUSB Router NBG-419N management.c lack proper filtering of the input, allowing an attacker to exploit the vulnerability to inject and execute arbitrary commands. This may aid in further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201404-0472",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "n300 netusb nbg-419n",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "1.00\\(bfq_6\\)c0"
},
{
"model": "n300 netusb nbg-419n",
"scope": "eq",
"trust": 1.0,
"vendor": "zyxel",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "zyxel",
"version": null
},
{
"model": "wireless n300 netusb router nbg-419n",
"scope": null,
"trust": 0.8,
"vendor": "zyxel",
"version": null
},
{
"model": "wireless n300 netusb router nbg-419n",
"scope": "eq",
"trust": 0.8,
"vendor": "zyxel",
"version": "1.00(bfq.6)c0"
},
{
"model": "n300 netusb router nbg-419n 1.00 c0",
"scope": null,
"trust": 0.6,
"vendor": "zyxel",
"version": null
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#939260"
},
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:zyxel:n300_netusb_nbg-419n",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:zyxel:n300_netusb_nbg-419n_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Anonymous",
"sources": [
{
"db": "BID",
"id": "66794"
}
],
"trust": 0.3
},
"cve": "CVE-2014-0356",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 5.5,
"id": "CVE-2014-0356",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 5.5,
"id": "CNVD-2014-02424",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 5.5,
"id": "VHN-67849",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:A/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-0356",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-0356",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2014-02424",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201404-207",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-67849",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "VULHUB",
"id": "VHN-67849"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ZyXEL Wireless N300 NetUSB NBG-419N router with firmware 1.00(BFQ.6)C0 allows remote attackers to execute arbitrary code via shell metacharacters in input to the (1) detectWeather, (2) set_language, (3) SystemCommand, or (4) NTPSyncWithHost function in management.c, or a (5) SET COUNTRY, (6) SET WLAN SSID, (7) SET WLAN CHANNEL, (8) SET WLAN STATUS, or (9) SET WLAN COUNTRY udps command. ZyXEL Wireless N300 NetUSB Router NBG-419N running firmware version 1.00(BFQ.6)C0, and possibly earlier versions, is susceptible to multiple vulnerabilities. Other device models that use similar firmware may also be vulnerable. ZyXEL Wireless N300 NetUSB Router NBG-419N is a router device. The detectWeather(), set_language(), SystemCommand(), and NTPSyncWithHost() functions in the ZyXEL Wireless N300 NetUSB Router NBG-419N management.c lack proper filtering of the input, allowing an attacker to exploit the vulnerability to inject and execute arbitrary commands. This may aid in further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0356"
},
{
"db": "CERT/CC",
"id": "VU#939260"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "BID",
"id": "66794"
},
{
"db": "VULHUB",
"id": "VHN-67849"
}
],
"trust": 3.24
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#939260",
"trust": 4.2
},
{
"db": "NVD",
"id": "CVE-2014-0356",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVNVU94935747",
"trust": 1.4
},
{
"db": "BID",
"id": "66794",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201404-207",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-02424",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "26504",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-67849",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#939260"
},
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "VULHUB",
"id": "VHN-67849"
},
{
"db": "BID",
"id": "66794"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"id": "VAR-201404-0472",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "VULHUB",
"id": "VHN-67849"
}
],
"trust": 1.45
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02424"
}
]
},
"last_update_date": "2025-04-13T23:18:23.896000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "NBG-419N v2",
"trust": 0.8,
"url": "http://www.zyxel.com/us/en/products_services/nbg_419n_v2.shtml?t=p"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-67849"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://www.kb.cert.org/vuls/id/939260"
},
{
"trust": 0.8,
"url": "http://www.zyxel.com/"
},
{
"trust": 0.8,
"url": "https://cwe.mitre.org/data/definitions/425.html"
},
{
"trust": 0.8,
"url": "https://cwe.mitre.org/data/definitions/259.html"
},
{
"trust": 0.8,
"url": "https://cwe.mitre.org/data/definitions/121.html"
},
{
"trust": 0.8,
"url": "https://cwe.mitre.org/data/definitions/78.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0356"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu94935747/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0356"
},
{
"trust": 0.6,
"url": "http://jvn.jp/vu/jvnvu94935747/index.html"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/26504"
},
{
"trust": 0.3,
"url": "http://www.zyxel.com/products_services/nbg_419n_v2.shtml?t=p"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#939260"
},
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "VULHUB",
"id": "VHN-67849"
},
{
"db": "BID",
"id": "66794"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#939260"
},
{
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"db": "VULHUB",
"id": "VHN-67849"
},
{
"db": "BID",
"id": "66794"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-04-11T00:00:00",
"db": "CERT/CC",
"id": "VU#939260"
},
{
"date": "2014-04-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"date": "2014-04-15T00:00:00",
"db": "VULHUB",
"id": "VHN-67849"
},
{
"date": "2014-04-11T00:00:00",
"db": "BID",
"id": "66794"
},
{
"date": "2014-04-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"date": "2014-04-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"date": "2014-04-15T10:55:12.057000",
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-04-16T00:00:00",
"db": "CERT/CC",
"id": "VU#939260"
},
{
"date": "2014-04-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-02424"
},
{
"date": "2014-04-15T00:00:00",
"db": "VULHUB",
"id": "VHN-67849"
},
{
"date": "2014-04-11T00:00:00",
"db": "BID",
"id": "66794"
},
{
"date": "2014-04-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002027"
},
{
"date": "2014-04-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201404-207"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2014-0356"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ZyXEL Wireless N300 NetUSB Router NBG-419N devices contain multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#939260"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201404-207"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.