First published: Fri Aug 24 2018(Updated: )
An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don't require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d "REQ_ID=SUPPORT_IF_GET").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NEC Aterm WG2600HP2 firmware | =1.0.2 | |
NEC Aterm WG2600HP2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12575 has a medium severity rating due to the risk of unauthorized access to sensitive configuration data.
To fix CVE-2017-12575, upgrade the NEC Aterm WG2600HP2 firmware to the latest version that requires authentication for all web service APIs.
CVE-2017-12575 affects the NEC Aterm WG2600HP2 router running firmware version 1.0.2.
Yes, an attacker can exploit CVE-2017-12575 remotely by sending a crafted HTTP request to the router.
CVE-2017-12575 could allow an attacker to retrieve DHCP client information and firmware version details without authentication.