- Description
- Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rt311:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3653528A-E4EE-44AA-9EF9-EC6C58D8BFE5"
},
{
"criteria": "cpe:2.3:h:netgear:rt314:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "76508DEB-9224-46CD-9BB9-9F4B99E0850D"
},
{
"criteria": "cpe:2.3:h:zyxel:prestige:310:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "15AA9574-519C-4F2A-A666-64D8813BA468"
},
{
"criteria": "cpe:2.3:h:zyxel:prestige:314:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AA2377B1-5B43-45AB-A880-B1D3E74C1444"
},
{
"criteria": "cpe:2.3:h:zyxel:prestige:324:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EF9F48F8-ACA9-4254-A3CD-7451F4EA7B23"
}
],
"operator": "OR"
}
]
}
]