{ "schema_version": "1.4.0", "id": "GHSA-gmxg-mq3h-jjwv", "modified": "2022-05-01T07:00:26Z", "published": "2022-05-01T07:00:26Z", "aliases": [ "CVE-2006-2562" ], "details": "ZyXEL P-335WT router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2562" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26710" }, { "type": "WEB", "url": "http://secunia.com/advisories/20184" }, { "type": "WEB", "url": "http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html" }, { "type": "WEB", "url": "http://www.securityview.org/how-does-the-upnp-flaw-works.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/1910" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-05-24T01:02:00Z" } }