CVE-2005-0328
Published May 2, 2005
Last updated 7 years ago
Overview
- Description
- Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:rt311:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3653528A-E4EE-44AA-9EF9-EC6C58D8BFE5" }, { "criteria": "cpe:2.3:h:netgear:rt314:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76508DEB-9224-46CD-9BB9-9F4B99E0850D" }, { "criteria": "cpe:2.3:h:zyxel:prestige:310:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15AA9574-519C-4F2A-A666-64D8813BA468" }, { "criteria": "cpe:2.3:h:zyxel:prestige:314:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA2377B1-5B43-45AB-A880-B1D3E74C1444" }, { "criteria": "cpe:2.3:h:zyxel:prestige:324:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF9F48F8-ACA9-4254-A3CD-7451F4EA7B23" } ], "operator": "OR" } ] } ]