CVE-2016-10372
The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547,...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 16, 2017
- Published Date
- May 16, 2017
- Last Updated
- August 06, 2024
- Vendor
- Eir
- Product
- D1000 modem
- Description
- The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547, as demonstrated by opening WAN access to TCP port 80, retrieving the login password (which defaults to the Wi-Fi password), and using the NewNTPServer feature.
- Tags
- Score
- 91.97% (Percentile: 99.68%) as of 2025-05-26
- Exploited in the Wild
- Yes (2025-05-05 00:00:00 UTC) Source
metasploit_scanner
CVSS Scores
CVSS v2.0
10.0
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS Score
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-04-28 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb | 2025-04-29 11:01:15 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
tr064_ntpserver_cmdinject
Type: metasploit • Created: Unknown
Metasploit module for CVE-2016-10372
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Detected by Metasploit