CVE-2015-7282

ReadyNet WRT300N-DD devices with firmware 1.0.26 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port.
References
Link Resource
http://www.securityfocus.com/bid/78814
https://www.kb.cert.org/vuls/id/167992 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:readynet_solutions:wrt300n-dd_firmware:1.0.26:*:*:*:*:*:*:*
cpe:2.3:h:readynet_solutions:wrt300n-dd:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-12-31 05:59

Updated : 2024-02-04 18:53


NVD link : CVE-2015-7282

Mitre link : CVE-2015-7282

CVE.ORG link : CVE-2015-7282


JSON object : View

Products Affected

readynet_solutions

  • wrt300n-dd_firmware
  • wrt300n-dd
CWE
CWE-20

Improper Input Validation