| Name |
Description |
| CVE-2017-9930 |
Cross-Site Request Forgery (CSRF) exists in Green Packet DX-350
Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by a request
to ajax.cgi that enables UPnP.
|
| CVE-2017-9480 |
The Comcast firmware on Cisco DPC3939 (firmware version
dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows local users
(e.g., users who have command access as a consequence of CVE-2017-9479
exploitation) to read arbitrary files via UPnP access to /var/IGD/.
|
| CVE-2017-3882 |
A vulnerability in the Universal Plug-and-Play (UPnP) implementation in
the Cisco CVR100W Wireless-N VPN Router could allow an unauthenticated,
Layer 2-adjacent attacker to execute arbitrary code or cause a denial
of service (DoS) condition. The remote code execution could occur with
root privileges. The vulnerability is due to incomplete range checks of
the UPnP input data, which could result in a buffer overflow. An
attacker could exploit this vulnerability by sending a malicious
request to the UPnP listening port of the targeted device. An exploit
could allow the attacker to cause the device to reload or potentially
execute arbitrary code with root privileges. This vulnerability affects
all firmware releases of the Cisco CVR100W Wireless-N VPN Router prior
to Firmware Release 1.0.1.22. Cisco Bug IDs: CSCuz72642.
|
| CVE-2016-8863 |
Heap-based buffer overflow in the create_url_list function in
gena/gena_device.c in Portable UPnP SDK (aka libupnp) before 1.6.21
allows remote attackers to cause a denial of service (crash) or
possibly execute arbitrary code via a valid URI followed by an invalid
one in the CALLBACK header of an SUBSCRIBE request.
|
| CVE-2016-6255 |
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers
to write to arbitrary files in the webroot via a POST request without
a registered handler.
|
| CVE-2016-5301 |
The parse_chunk_header function in libtorrent before 1.1.1 allows
remote attackers to cause a denial of service (crash) via a crafted
(1) HTTP response or possibly a (2) UPnP broadcast.
|
| CVE-2015-6031 |
Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the
MiniUPnP client (aka MiniUPnPc) before 1.9.20150917 allows remote UPNP
servers to cause a denial of service (application crash) and possibly
execute arbitrary code via an "oversized" XML element name.
|
| CVE-2015-4141 |
The WPS UPnP function in hostapd, when using WPS AP, and
wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through
2.4 allows remote attackers to cause a denial of service (crash) via a
negative chunk length, which triggers an out-of-bounds read or
heap-based buffer overflow.
|
| CVE-2015-2984 |
I-O DATA DEVICE WN-G54/R2 routers with firmware before 1.03 and
NP-BBRS routers allow remote attackers to cause a denial of service
(SSDP reflection) via UPnP requests.
|
| CVE-2015-0869 |
I-O DATA DEVICE NP-BBRM routers allow remote attackers to cause a
denial of service (SSDP reflection) via UPnP requests.
|
| CVE-2014-8654 |
Multiple cross-site request forgery (CSRF) vulnerabilities in Compal
Broadband Networks (CBN) CH6640E and CG6640E Wireless Gateway hardware
1.0 with firmware CH6640-3.5.11.7-NOSH allow remote attackers to
hijack the authentication of administrators for requests that (1) have
unspecified impact on DDNS configuration via a request to
basicDDNS.html, (2) change the wifi password via the psKey parameter
to setWirelessSecurity.html, (3) add a static MAC address via the
MacAddress parameter in an add_static action to setBasicDHCP1.html, or
(4) enable or disable UPnP via the UPnP parameter in an apply action
to setAdvancedOptions.html.
|
| CVE-2014-5406 |
The Hospira LifeCare PCA Infusion System before 7.0 does not validate
network traffic associated with sending a (1) drug library, (2)
software update, or (3) configuration change, which allows remote
attackers to modify settings or medication data via packets on the (a)
TELNET, (b) HTTP, (c) HTTPS, or (d) UPNP port. NOTE: this issue might
overlap CVE-2015-3459.
|
| CVE-2013-5006 |
main_internet.php on the Western Digital My Net N600 and N750 with
firmware 1.03.12 and 1.04.16, and the N900 and N900C with firmware
1.05.12, 1.06.18, and 1.06.28, allows remote attackers to discover the
cleartext administrative password by reading the "var pass=" line
within the HTML source code.
|
| CVE-2013-3613 |
Dahua DVR appliances do not properly restrict UPnP requests, which
makes it easier for remote attackers to obtain access via vectors
involving a replay attack against the TELNET port.
|
| CVE-2013-1462 |
Integer signedness error in the ExecuteSoapAction function in the
SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0
allows remote attackers to cause a denial of service (incorrect memory
copy) via a SOAPAction header that lacks a " (double quote) character,
a different vulnerability than CVE-2013-0230.
|
| CVE-2013-1461 |
The ExecuteSoapAction function in the SOAPAction handler in the HTTP
service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to cause a
denial of service (NULL pointer dereference and service crash) via a
SOAPAction header that lacks a # (pound sign) character, a different
vulnerability than CVE-2013-0230.
|
| CVE-2013-0274 |
upnp.c in libpurple in Pidgin before 2.10.7 does not properly
terminate long strings in UPnP responses, which allows remote
attackers to cause a denial of service (application crash) by
leveraging access to the local network.
|
| CVE-2013-0230 |
Stack-based buffer overflow in the ExecuteSoapAction function in the
SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0
allows remote attackers to execute arbitrary code via a long quoted
method.
|
| CVE-2013-0229 |
The ProcessSSDPRequest function in minissdp.c in the SSDP handler in
MiniUPnP MiniUPnPd before 1.4 allows remote attackers to cause a
denial of service (service crash) via a crafted request that triggers
a buffer over-read.
|
| CVE-2012-5965 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1
allows remote attackers to execute arbitrary code via a long
DeviceType (aka urn device) field in a UDP packet.
|
| CVE-2012-5964 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1
allows remote attackers to execute arbitrary code via a long
ServiceType (aka urn service) field in a UDP packet.
|
| CVE-2012-5963 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1
allows remote attackers to execute arbitrary code via a long UDN (aka
uuid) field within a string that lacks a :: (colon colon) in a UDP
packet.
|
| CVE-2012-5962 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1
allows remote attackers to execute arbitrary code via a long
DeviceType (aka urn) field in a UDP packet.
|
| CVE-2012-5961 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1
allows remote attackers to execute arbitrary code via a long UDN (aka
device) field in a UDP packet.
|
| CVE-2012-5960 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before
1.6.18 allows remote attackers to execute arbitrary code via a long
UDN (aka upnp:rootdevice) field in a UDP packet.
|
| CVE-2012-5959 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before
1.6.18 allows remote attackers to execute arbitrary code via a long
UDN (aka uuid) field within a string that contains a :: (colon colon)
in a UDP packet.
|
| CVE-2012-5958 |
Stack-based buffer overflow in the unique_service_name function in
ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP
Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before
1.6.18 allows remote attackers to execute arbitrary code via a UDP
packet with a crafted string that is not properly handled after a
certain pointer subtraction.
|
| CVE-2011-4506 |
The UPnP IGD implementation on the Thomson (aka Technicolor) TG585
with firmware 7.x before 7.4.3.2 allows remote attackers to establish
arbitrary port mappings by sending a UPnP AddPortMapping action in a
SOAP request to the WAN interface, related to an "external forwarding"
vulnerability.
|
| CVE-2011-4505 |
The UPnP IGD implementation on SpeedTouch 5x6 devices with firmware
before 6.2.29 allows remote attackers to establish arbitrary port
mappings by sending a UPnP AddPortMapping action in a SOAP request to
the WAN interface, related to an "external forwarding" vulnerability.
|
| CVE-2011-4504 |
The UPnP IGD implementation in the Pseudo ICS UPnP software on the
ZyXEL P-330W allows remote attackers to establish arbitrary port
mappings by sending a UPnP AddPortMapping action in a SOAP request to
the WAN interface, related to an "external forwarding" vulnerability.
|
| CVE-2011-4503 |
The UPnP IGD implementation in Broadcom Linux on the Sitecom WL-111
allows remote attackers to establish arbitrary port mappings by
sending a UPnP AddPortMapping action in a SOAP request to the WAN
interface, related to an "external forwarding" vulnerability.
|
| CVE-2011-4502 |
The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K
with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with
firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153
with firmware before 1.39, and Sweex LB000021 with firmware 3.15
allows remote attackers to execute arbitrary commands via shell
metacharacters.
|
| CVE-2011-4501 |
The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K
with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with
firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153
with firmware before 1.39, and Sweex LB000021 with firmware 3.15
allows remote attackers to establish arbitrary port mappings by
sending a UPnP AddPortMapping action in a SOAP request to the WAN
interface, related to an "external forwarding" vulnerability.
|
| CVE-2011-4500 |
The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware
2.00.05, when UPnP is enabled, configures the SOAP server to listen on
the WAN port, which allows remote attackers to administer the firewall
via SOAP requests.
|
| CVE-2011-4499 |
The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco
Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with
firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1
allows remote attackers to establish arbitrary port mappings by
sending a UPnP AddPortMapping action in a SOAP request to the WAN
interface, related to an "external forwarding" vulnerability.
|
| CVE-2011-1165 |
Vino, possibly before 3.2, does not properly document that it opens
ports in UPnP routers when the "Configure network to automatically
accept connections" setting is enabled, which might make it easier for
remote attackers to perform further attacks.
|
| CVE-2009-2174 |
GUPnP 0.12.7 allows remote attackers to cause a denial of service
(crash) via an empty (1) subscription or (2) control message.
|
| CVE-2008-2957 |
The UPnP functionality in Pidgin 2.0.0, and possibly other versions,
allows remote attackers to trigger the download of arbitrary files and
cause a denial of service (memory or disk consumption) via a UDP
packet that specifies an arbitrary URL.
|
| CVE-2008-1654 |
Interaction error between Adobe Flash and multiple Universal Plug and
Play (UPnP) services allow remote attackers to perform Cross-Site
Request Forgery (CSRF) style attacks by using the Flash navigateToURL
function to send a SOAP message to a UPnP control point, as
demonstrated by changing the primary DNS server.
|
| CVE-2007-3748 |
Buffer overflow in the UPnP IGD (Internet Gateway Device Standardized
Device Control Protocol) implementation in iChat on Apple Mac OS X
10.3.9 and 10.4.10 allows network-adjacent remote attackers to execute
arbitrary code via a crafted packet.
|
| CVE-2007-3744 |
Heap-based buffer overflow in the UPnP IGD (Internet Gateway Device
Standardized Device Control Protocol) implementation in mDNSResponder
on Apple Mac OS X 10.4.10 before 20070731 allows network-adjacent
remote attackers to execute arbitrary code via a crafted packet.
|
| CVE-2007-2390 |
Buffer overflow in iChat in Apple Mac OS X 10.3.9 and 10.4.9 allows
remote attackers to cause a denial of service (application
termination) and possibly execute arbitrary code via a crafted UPnP
Internet Gateway Device (IGD) packet.
|
| CVE-2007-2386 |
Buffer overflow in mDNSResponder in Apple Mac OS X 10.4 up to 10.4.9
allows remote attackers to cause a denial of service (application
termination) or execute arbitrary code via a crafted UPnP Internet
Gateway Device (IGD) packet.
|
| CVE-2007-1204 |
Stack-based buffer overflow in the Universal Plug and Play (UPnP)
service in Microsoft Windows XP SP2 allows remote attackers on the
same subnet to execute arbitrary code via crafted HTTP headers in
request or notification messages, which trigger memory corruption.
|
| CVE-2007-0357 |
Directory traversal vulnerability in the AVM IGD CTRL Service in
Fritz!DSL 02.02.29 allows remote attackers to read arbitrary files via
..%5C (URL-encoded dot dot backslash) sequences in a URI requested
from the AR7 webserver.
|
| CVE-2006-3687 |
Stack-based buffer overflow in the Universal Plug and Play (UPnP)
service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link
DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router,
and EBR-2310 Ethernet Broadband Router allows remote attackers to
execute arbitrary code via a long M-SEARCH request to UDP port 1900.
|
| CVE-2006-3344 |
Siemens Speedstream Wireless Router 2624 allows local users to bypass
authentication and access protected files by using the Universal Plug
and Play UPnP/1.0 component.
|
| CVE-2006-2562 |
ZyXEL P-335WT router allows remote attackers to bypass access
restrictions and conduct unauthorized operations via a UPnP request
with a modified InternalClient parameter, which is not validated, as
demonstrated by using AddPortMapping to forward arbitrary traffic.
|
| CVE-2006-2561 |
Edimax BR-6104K router allows remote attackers to bypass access
restrictions and conduct unauthorized operations via a UPnP request
with a modified InternalClient parameter (possibly within
NewInternalClient), which is not validated, as demonstrated by using
AddPortMapping to forward arbitrary traffic.
|
| CVE-2006-2560 |
Sitecom WL-153 router firmware before 1.38 allows remote attackers to
bypass access restrictions and conduct unauthorized operations via a
UPnP request with a modified InternalClient parameter, which is not
validated, as demonstrated by using AddPortMapping to forward
arbitrary traffic.
|
| CVE-2006-2559 |
Linksys WRT54G Wireless-G Broadband Router allows remote attackers to
bypass access restrictions and conduct unauthorized operations via a
UPnP request with a modified InternalClient parameter, which is not
validated, as demonstrated by using AddPortMapping to forward
arbitrary traffic.
|
| CVE-2006-0023 |
Microsoft Windows XP SP1 and SP2 before August 2004, and possibly
other operating systems and versions, uses insecure default ACLs that
allow the Authenticated Users group to gain privileges by modifying
critical configuration information for the (1) Simple Service
Discovery Protocol (SSDP), (2) Universal Plug and Play Device Host
(UPnP), (3) NetBT, (4) SCardSvr, (5) DHCP, and (6) DnsCache services,
aka "Permissive Windows Services DACLs." NOTE: the NetBT, SCardSvr,
DHCP, DnsCache already require privileged access to exploit.
|
| CVE-2005-3644 |
PNP_GetDeviceList (upnp_getdevicelist) in UPnP for Microsoft Windows
2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows
remote attackers to cause a denial of service (memory consumption) via
a DCE RPC request that specifies a large output buffer size, a variant
of CVE-2006-6296, and a different vulnerability than CVE-2005-2120.
|
| CVE-2005-2120 |
Stack-based buffer overflow in the Plug and Play (PnP) service
(UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2,
allows remote or local authenticated attackers to execute arbitrary
code via a large number of "\" (backslash) characters in a registry
key name, which triggers the overflow in a wsprintfW function call.
|
| CVE-2005-0833 |
Belkin 54G (F5D7130) wireless router allows remote attackers to access
restricted resources by sniffing URIs from UPNP datagrams, then
accessing those URIs, which do not require authentication.
|
| CVE-2001-0877 |
Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows
remote attackers to cause a denial of service via (1) a spoofed SSDP
advertisement that causes the client to connect to a service on
another machine that generates a large amount of traffic (e.g.,
chargen), or (2) via a spoofed SSDP announcement to broadcast or
multicast addresses, which could cause all UPnP clients to send
traffic to a single target system.
|
| CVE-2001-0876 |
Buffer overflow in Universal Plug and Play (UPnP) on Windows 98, 98SE,
ME, and XP allows remote attackers to execute arbitrary code via a
NOTIFY directive with a long Location URL.
|
| CVE-2001-0721 |
Universal Plug and Play (UPnP) in Windows 98, 98SE, ME, and XP allows
remote attackers to cause a denial of service (memory consumption or
crash) via a malformed UPnP request.
|