VAR-201702-1032
Vulnerability from variot - Updated: 2025-04-20 23:20The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. DellSonicWallSecureRemoteAccess is a SonicWALL Secure Remote Access Series appliance in the DellSonicWall Secure Mobile Access Solution. Exploiting these issues could allow an attacker to execute arbitrary commands in context of the affected application. Failed exploit attempts will result in a denial-of-service condition
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-1032",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "sonicwall secure remote access server",
"scope": "eq",
"trust": 1.6,
"vendor": "dell",
"version": "8.1.0.2-14sv"
},
{
"model": "sonicwall secure remote access",
"scope": "eq",
"trust": 0.8,
"vendor": "dell",
"version": "8.1.0.2-14sv"
},
{
"model": "sonicwall secure remote access server 8.1.0.2-14sv",
"scope": null,
"trust": 0.6,
"vendor": "dell",
"version": null
},
{
"model": "sonicwall secure remote access 8.1.0.2-14sv",
"scope": null,
"trust": 0.3,
"vendor": "dell",
"version": null
},
{
"model": "sonicwall secure remote access",
"scope": "ne",
"trust": 0.3,
"vendor": "dell",
"version": "8.1.0.7"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "BID",
"id": "96375"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:dell:sonicwall_secure_remote_access_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dell",
"sources": [
{
"db": "BID",
"id": "96375"
}
],
"trust": 0.3
},
"cve": "CVE-2016-9682",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-9682",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-02335",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-98502",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-9682",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-9682",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-9682",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-02335",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201702-802",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-98502",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-9682",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "VULMON",
"id": "CVE-2016-9682"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn\u0027t properly escape the information passed in the \u0027tsrDeleteRestartedFile\u0027 or \u0027currentTSREmailTo\u0027 variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. DellSonicWallSecureRemoteAccess is a SonicWALL Secure Remote Access Series appliance in the DellSonicWall Secure Mobile Access Solution. \nExploiting these issues could allow an attacker to execute arbitrary commands in context of the affected application. Failed exploit attempts will result in a denial-of-service condition",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9682"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "BID",
"id": "96375"
},
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "VULMON",
"id": "CVE-2016-9682"
}
],
"trust": 2.61
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-98502",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42342",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "VULMON",
"id": "CVE-2016-9682"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9682",
"trust": 3.5
},
{
"db": "BID",
"id": "96375",
"trust": 2.1
},
{
"db": "EXPLOIT-DB",
"id": "42342",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-02335",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "143418",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-98502",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-9682",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "VULMON",
"id": "CVE-2016-9682"
},
{
"db": "BID",
"id": "96375"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"id": "VAR-201702-1032",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "VULHUB",
"id": "VHN-98502"
}
],
"trust": 1.29126985
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
}
]
},
"last_update_date": "2025-04-20T23:20:05.981000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SonicWALL SMA 100 Series 8.1.0.7 - Release Notes",
"trust": 0.8,
"url": "https://support.sonicwall.com/technical-documents/sonicwall-sma-100-series/8.1.0.7/release-notes#TOPIC-661386"
},
{
"title": "DellSonicWallSecureRemoteAccess server command injection vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/89944"
},
{
"title": "Dell SonicWall Secure Remote Access Server command injection vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68106"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?parentproduct=868"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/96375"
},
{
"trust": 1.3,
"url": "https://www.exploit-db.com/exploits/42342/"
},
{
"trust": 1.2,
"url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2016-0003"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9682"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9682"
},
{
"trust": 0.6,
"url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9682"
},
{
"trust": 0.3,
"url": "http://dell.com"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/77.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "VULMON",
"id": "CVE-2016-9682"
},
{
"db": "BID",
"id": "96375"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "VULHUB",
"id": "VHN-98502"
},
{
"db": "VULMON",
"id": "CVE-2016-9682"
},
{
"db": "BID",
"id": "96375"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-03-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"date": "2017-02-22T00:00:00",
"db": "VULHUB",
"id": "VHN-98502"
},
{
"date": "2017-02-22T00:00:00",
"db": "VULMON",
"id": "CVE-2016-9682"
},
{
"date": "2017-01-27T00:00:00",
"db": "BID",
"id": "96375"
},
{
"date": "2017-03-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"date": "2017-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"date": "2017-02-22T05:59:00.167000",
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-03-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"date": "2018-10-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98502"
},
{
"date": "2018-10-17T00:00:00",
"db": "VULMON",
"id": "CVE-2016-9682"
},
{
"date": "2017-03-07T04:04:00",
"db": "BID",
"id": "96375"
},
{
"date": "2017-03-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007699"
},
{
"date": "2017-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-802"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2016-9682"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dell SonicWall Secure Remote Access Server Command Injection Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-02335"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "command injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-802"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.