CVE-2016-1525
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
13/02/2016
Last modified:
12/04/2025
Description
Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and earlier allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:netgear:prosafe_network_management_software_300:1.5.0.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html
- http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html
- http://seclists.org/fulldisclosure/2016/Feb/30
- http://www.kb.cert.org/vuls/id/777024
- http://www.rapid7.com/db/modules/exploit/windows/http/netgear_nms_rce
- http://www.securityfocus.com/archive/1/537446/100/0/threaded
- https://www.exploit-db.com/exploits/39412/
- https://www.exploit-db.com/exploits/39515/
- http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html
- http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html
- http://seclists.org/fulldisclosure/2016/Feb/30
- http://www.kb.cert.org/vuls/id/777024
- http://www.rapid7.com/db/modules/exploit/windows/http/netgear_nms_rce
- http://www.securityfocus.com/archive/1/537446/100/0/threaded
- https://www.exploit-db.com/exploits/39412/
- https://www.exploit-db.com/exploits/39515/



