Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2005-0328
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:h:zyxel:prestige:314:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:h:zyxel:prestige:310:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:h:netgear:rt314:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:h:zyxel:prestige:324:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:h:netgear:rt311:*:*:*:*:*:*:*:* |
Yes
|
- | - |