Описание
Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:netgear:rt311:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rt314:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:310:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:314:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:324:*:*:*:*:*:*:*
EPSS
Процентиль: 57%
0.00346
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address.
EPSS
Процентиль: 57%
0.00346
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other