From a9149b54507bf66acccea0732202c7f88d136a7c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 3 Feb 2023 00:01:04 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/23xxx/CVE-2023-23110.json | 42 +++++++++++++++++++++++++++++++++- 1 file changed, 41 insertions(+), 1 deletion(-) diff --git a/2023/23xxx/CVE-2023-23110.json b/2023/23xxx/CVE-2023-23110.json index 9d31d80c0be..05dff4b93f4 100644 --- a/2023/23xxx/CVE-2023-23110.json +++ b/2023/23xxx/CVE-2023-23110.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An exploitable firmware modification vulnerability was discovered in WNR612v2 Wireless Routers firmware version 1.0.0.3 and earlier. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification." + "value": "An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless Routers 1.1.2.60 and earlier, XAVN2001v2 Wireless-N Extenders 0.4.0.7 and earlier, WNR2200 Wireless Routers 1.0.1.102 and earlier, WNR2500 Wireless Routers 1.0.0.34 and earlier, R8900 Smart WiFi Routers 1.0.3.6 and earlier, and R9000 Smart WiFi Routers 1.0.3.6 and earlier." } ] }, @@ -62,6 +62,46 @@ "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SJCGkb-9o", "refsource": "MISC", "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SJCGkb-9o" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/r1Z4BX-5i", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/r1Z4BX-5i" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/H1lIcXbco", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/H1lIcXbco" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/ryjVZz-5s", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/ryjVZz-5s" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1t47Ebqj", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1t47Ebqj" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1BNhbWqi", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1BNhbWqi" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HyZRxmb9s", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HyZRxmb9s" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BkBPIeGco", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BkBPIeGco" + }, + { + "url": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1qWglM5o", + "refsource": "MISC", + "name": "https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1qWglM5o" } ] }