Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-10175

Severity
9.8CRITICAL
EPSS
81.6%
top 0.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 30
Latest updateMay 17

Description

The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success.html URI. This serial number allows a user to obtain the administrator username and password, when used in combination with the CVE-2016-10176 vulnerability that allows resetting the answers to the password-recovery questions.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-ghhf-xp94-4ggw: The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success2022-05-17
CVEList
CVE-2016-10175: The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success2017-01-30

💥Exploits & PoCs

1
Exploit-DB
Netgear WNR2000v5 - Remote Code Execution2016-12-21

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Netgear WNR2000v5 Possible Serial Number Leak2017-02-02
CVE-2016-10175 (CRITICAL CVSS 9.8) | The NETGEAR WNR2000v5 router leaks | cvebase.io