Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:iball:ib-wra150n_firmware:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "2AAD4C77-CAA7-4B35-AE3E-F41895D1B5A8", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:iball:ib-wra150n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C9AEFCD-95EC-4A36-B1F3-F5D91761F477", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n devices are prone to an authentication bypass vulnerability that allows remote attackers to view and modify administrative router settings by reading the HTML source code of the password.cgi file."}, {"lang": "es", "value": "Dispositivos iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n son propensos a una vulnerabilidad de elusi\u00f3n de autenticaci\u00f3n que permite a atacantes remotos ver y modificar la configuraci\u00f3n administrativa del router leyendo el c\u00f3digo fuente HTML del archivo password.cgi."}], "id": "CVE-2017-6558", "lastModified": "2024-11-21T03:30:01.730", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-03-09T09:59:00.363", "references": [{"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/96822"}, {"source": "cve@mitre.org", "url": "https://www.youtube.com/watch?v=8GZg1IuSfCs"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/96822"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.youtube.com/watch?v=8GZg1IuSfCs"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-798"}], "source": "nvd@nist.gov", "type": "Primary"}]}