vendor:
NMS300 ProSAFE Network Management System
by:
Pedro Ribeiro
8,1
CVSS
HIGH
Remote code execution / arbitrary file download
434, 22
CWE
Product Name: NMS300 ProSAFE Network Management System
Affected Version From: NMS300 1.1.0.13
Affected Version To: NMS300 1.5.0.11
Patch Exists: Yes
Related CWE: CVE-2016-1525, CVE-2016-1526
CPE: a:netgear:nms300
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/mfsa2016-14-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-1526/, https://www.rapid7.com/db/vulnerabilities/mozilla-thunderbird-cve-2016-1526/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2016
Remote code execution / arbitrary file download in NETGEAR ProSafe Network Management System NMS300
Netgear's NMS300 is a network management utility that runs on Windows systems. It has serious two vulnerabilities that can be exploited by a remote attacker. The first one is an arbitrary file upload vulnerability that allows an unauthenticated attacker to execute Java code as the SYSTEM user. The second vulnerability is an arbitrary file download that allows an authenticated user to download any file from the host that is running NMS300.
Mitigation:
The vendor has released a patch to address the vulnerabilities. Users should upgrade to the latest version of the software.