VAR-201509-0226

Vulnerability from variot - Updated: 2025-04-13 23:05

Buffer overflow in form2ping.cgi on Philippine Long Distance Telephone (PLDT) SpeedSurf 504AN devices with firmware GAN9.8U26-4-TX-R6B018-PH.EN and Kasda KW58293 devices allows remote attackers to cause a denial of service (device outage) via a long ipaddr parameter. The Phillipine Long Distance Telephone (PLDT) company provides internet access in the Phillippines. The SpeedSurf 504AN and Kasda KW58293 modems distributed by PLDT contain multiple vulnerabilities. The BaudTec ADSL2+ Router may also be affected. PLDT SpeedSurf 504AN and Kasda KW58293 incorrectly use the form2ping.cgi page to send PING requests, allowing remote attackers to submit special \342\200\230ipaddr\342\200\231 parameters for denial of service attacks. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. The former is a product of the Philippine PLDT company. The latter is a product of China Hongcheng (Kasda) Digital Technology Co., Ltd. There is a buffer overflow vulnerability in the form2ping.cgi file of PLDT SpeedSurf 504AN device and Kasda KW58293 using GAN9.8U26-4-TX-R6B018-PH.EN firmware

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201509-0226",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "speedsurf 504an",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "philippine long distance telephone",
        "version": "gan9.8u26-4-tx-r6b018-hp.en"
      },
      {
        "model": "kasda kw58293",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "philippine long distance telephone",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "philippine long distance telephone",
        "version": null
      },
      {
        "model": "kw58293",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "kasda",
        "version": "none"
      },
      {
        "model": "kw58293",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "kasda",
        "version": "firmware"
      },
      {
        "model": "speedsurf 504an",
        "scope": null,
        "trust": 0.8,
        "vendor": "philippine long distance telephone pldt",
        "version": null
      },
      {
        "model": "speedsurf 504an",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "philippine long distance telephone pldt",
        "version": "gan9.8u26-4-tx-r6b018-ph.en"
      },
      {
        "model": "speedsurf 504an gan9.8u26-4-tx-r6b018-ph.en",
        "scope": null,
        "trust": 0.6,
        "vendor": "philippine long distance telephone",
        "version": null
      },
      {
        "model": "kasda kw58293",
        "scope": null,
        "trust": 0.6,
        "vendor": "philippine long distance telephone",
        "version": null
      },
      {
        "model": "speedsurf 504an gan9.8u26-4-tx-r6b01",
        "scope": null,
        "trust": 0.3,
        "vendor": "philippine long distance telephone",
        "version": null
      },
      {
        "model": "kasda kw58293",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "philippine long distance telephone",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "BID",
        "id": "76526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:misc:kasda_kw58293",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:philippine_long_distance_telephone:pldt_speedsurf_504an",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:philippine_long_distance_telephone:pldt_speedsurf_504an_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eskie Cirrus James Maquilang",
    "sources": [
      {
        "db": "BID",
        "id": "76526"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-5993",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-5993",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-06098",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-83954",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-5993",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-5993",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-06098",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201509-216",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-83954",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in form2ping.cgi on Philippine Long Distance Telephone (PLDT) SpeedSurf 504AN devices with firmware GAN9.8U26-4-TX-R6B018-PH.EN and Kasda KW58293 devices allows remote attackers to cause a denial of service (device outage) via a long ipaddr parameter. The Phillipine Long Distance Telephone (PLDT) company provides internet access in the Phillippines. The SpeedSurf 504AN and Kasda KW58293 modems distributed by PLDT contain multiple vulnerabilities. The BaudTec ADSL2+ Router may also be affected. PLDT SpeedSurf 504AN and Kasda KW58293 incorrectly use the form2ping.cgi page to send PING requests, allowing remote attackers to submit special \\342\\200\\230ipaddr\\342\\200\\231 parameters for denial of service attacks. \nAttackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. The former is a product of the Philippine PLDT company. The latter is a product of China Hongcheng (Kasda) Digital Technology Co., Ltd. There is a buffer overflow vulnerability in the form2ping.cgi file of PLDT SpeedSurf 504AN device and Kasda KW58293 using GAN9.8U26-4-TX-R6B018-PH.EN firmware",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      },
      {
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "BID",
        "id": "76526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      }
    ],
    "trust": 3.24
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#525276",
        "trust": 4.2
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVNVU98946427",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "76526",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "db": "BID",
        "id": "76526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "id": "VAR-201509-0226",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      }
    ],
    "trust": 1.30416665
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:05:16.520000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "KW58293",
        "trust": 0.8,
        "url": "http://www.kasda.cn/product_info.asp?id=232"
      },
      {
        "title": "PLDT - Philippine Long Distance Telephone Company",
        "trust": 0.8,
        "url": "http://www.pldt.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://www.kb.cert.org/vuls/id/525276"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5993"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu98946427/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5993"
      },
      {
        "trust": 0.3,
        "url": "http://www.pldt.com/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "db": "BID",
        "id": "76526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "db": "BID",
        "id": "76526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-08-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "date": "2015-09-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "date": "2015-09-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "date": "2015-08-31T00:00:00",
        "db": "BID",
        "id": "76526"
      },
      {
        "date": "2015-09-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "date": "2015-08-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "date": "2015-09-21T10:59:08.630000",
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-04-17T00:00:00",
        "db": "CERT/CC",
        "id": "VU#525276"
      },
      {
        "date": "2015-09-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-06098"
      },
      {
        "date": "2015-09-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-83954"
      },
      {
        "date": "2015-08-31T00:00:00",
        "db": "BID",
        "id": "76526"
      },
      {
        "date": "2015-09-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004949"
      },
      {
        "date": "2015-09-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-5993"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Philippine Long Distance Telephone SpeedSurf 504AN and Kasda KW58293 contain multiple vulnerabilities",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#525276"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201509-216"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…