CVE-2016-10372
The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547,...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 16, 2017
- Published Date
- May 16, 2017
- Last Updated
- August 06, 2024
- Vendor
- n/a
- Product
- n/a
- Description
- The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547, as demonstrated by opening WAN access to TCP port 80, retrieving the login password (which defaults to the Wi-Fi password), and using the NewNTPServer feature.
CVSS Scores
EPSS Score
- Score
- 91.97% (Percentile: 99.67%) as of 2025-04-29
Exploit Status
- Exploited in the Wild
- Yes (added 2025-04-23 00:00:00 UTC) Source
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-04-28 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb | 2025-04-29 11:01:15 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
tr064_ntpserver_cmdinject
Type: metasploit • Created: Unknown
Metasploit module for CVE-2016-10372