{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T16:20:00.177","vulnerabilities":[{"cve":{"id":"CVE-2016-9684","sourceIdentifier":"cve@mitre.org","published":"2017-02-22T05:59:00.247","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CGI application doesn't properly escape the information it's passed in the 'CERT' variable before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account."},{"lang":"es","value":"El servidor SonicWall Secure Remote Access (version 8.1.0.2-14sv) es vulnerable a una vulnerabilidad de Inyección Remota de Comandos en su interfaz administrativa web. Esta vulnerabilidad tiene lugar en el componente 'viewcert' CGI (/cgi-bin/viewcert) responsable del procesamiento de la información del certificado SSL. La aplicación CGI no escapa adecuadamente de la información pasada en la variable 'CERT' antes de que se realice una llamada al sistema() - permitiendo la inyección remota de comandos. La explotación de esta vulnerabilidad genera acceso shell a la máquina remota bajo la cuenta de usuario \"nobody\"."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dell:sonicwall_secure_remote_access_server:8.1.0.2-14sv:*:*:*:*:*:*:*","matchCriteriaId":"82AE3BB1-3886-41EE-866C-25EA3B21FDBA"}]}]}],"references":[{"url":"http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"http://pastebin.com/g1e2qU6N","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/96375","source":"cve@mitre.org"},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0005","source":"cve@mitre.org"},{"url":"http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"http://pastebin.com/g1e2qU6N","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/96375","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0005","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}