Critical severity9.8NVD Advisory· Published Jan 30, 2017· Updated May 13, 2026
CVE-2016-10176
CVE-2016-10176
Description
The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- kb.netgear.com/000036549/Insecure-Remote-Access-and-Command-Execution-Security-VulnerabilitynvdPatchVendor Advisory
- seclists.org/fulldisclosure/2016/Dec/72nvdExploitThird Party AdvisoryVDB Entry
- raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txtnvdExploitTechnical DescriptionThird Party Advisory
- www.securityfocus.com/bid/95867nvdThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/40949/nvd
News mentions
0No linked articles in our index yet.