VAR-201703-0050

Vulnerability from variot - Updated: 2025-04-20 23:31

Huawei AR3200 routers with software before V200R007C00SPC600 allow remote attackers to cause a denial of service or execute arbitrary code via a crafted packet. HuaweiAR3200 is an AR3200 series enterprise router product. Huawei AR3200 Routers are prone to a remote code-execution vulnerability. Failed exploit attempts may cause a denial-of-service condition. An input validation vulnerability exists in the Huawei AR3200 router. The following versions are affected: AR3200 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R002C01 Version, V200R002C02 Version, V200R002C05 Version, V200R003C00 Version, V200R003C01 Version, V200R003C05 Version, V200R005C00 Version, V200R005C10 Version, V200R005C20 Version, V200R005C21 Version, V200R005C30 Version, V200R005C31 Version , version V200R005C32, version V200R006C00, version V200R006C10, version V200R006C11, version V200R006C12, version V200R006C13, version V200R006C15, version V200R006C16, version V200R006C17

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0050",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r002c05"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r001c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r002c02"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r002c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r005c30"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r003c01"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r002c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r005c21"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r003c05"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c32"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c12"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c20"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c13"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c15"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c31"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c17"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c10"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005c00"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c11"
      },
      {
        "model": "ar3200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r006c16"
      },
      {
        "model": "ar3200 v200r001c00",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r001c01",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r002c00",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r002c01",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r002c02",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r002c05",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r003c00",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r003c01",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r003c05",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c00",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c10",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c21",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c31",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r007c00spc600"
      },
      {
        "model": "ar3200 v200r005c30",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c17",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c16",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c15",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c13",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c12",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c11",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c10",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r006c00",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c32",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r005c20",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar3200 v200r007c00spc600",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "BID",
        "id": "91774"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:ar3200_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "91774"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-6206",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-6206",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-05047",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-95026",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-6206",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-6206",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-6206",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-05047",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201607-413",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-95026",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei AR3200 routers with software before V200R007C00SPC600 allow remote attackers to cause a denial of service or execute arbitrary code via a crafted packet. HuaweiAR3200 is an AR3200 series enterprise router product. Huawei AR3200 Routers are prone to a remote code-execution vulnerability. Failed exploit attempts may cause a denial-of-service condition. An input validation vulnerability exists in the Huawei AR3200 router. The following versions are affected: AR3200 V200R001C00 Version, V200R001C01 Version, V200R002C00 Version, V200R002C01 Version, V200R002C02 Version, V200R002C05 Version, V200R003C00 Version, V200R003C01 Version, V200R003C05 Version, V200R005C00 Version, V200R005C10 Version, V200R005C20 Version, V200R005C21 Version, V200R005C30 Version, V200R005C31 Version , version V200R005C32, version V200R006C00, version V200R006C10, version V200R006C11, version V200R006C12, version V200R006C13, version V200R006C15, version V200R006C16, version V200R006C17",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "BID",
        "id": "91774"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-6206",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "91774",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "db": "BID",
        "id": "91774"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "id": "VAR-201703-0050",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      }
    ],
    "trust": 1.4950987800000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:31:03.372000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20160713-01-router",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-router-en"
      },
      {
        "title": "HuaweiAR3200Routers patch for remote code execution vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/79361"
      },
      {
        "title": "Huawei AR3200 Routers Fixes for remote code execution vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62958"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/91774"
      },
      {
        "trust": 2.0,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-router-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6206"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6206"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "db": "BID",
        "id": "91774"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "db": "BID",
        "id": "91774"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "date": "2017-03-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "date": "2016-07-13T00:00:00",
        "db": "BID",
        "id": "91774"
      },
      {
        "date": "2017-04-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "date": "2016-07-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "date": "2017-03-24T15:59:00.683000",
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05047"
      },
      {
        "date": "2017-03-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-95026"
      },
      {
        "date": "2016-07-13T00:00:00",
        "db": "BID",
        "id": "91774"
      },
      {
        "date": "2017-04-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      },
      {
        "date": "2017-03-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2016-6206"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei AR3200 Service disruption in router software  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008074"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-413"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…