9.3
CVE-2016-6277
- EPSS 94.28%
- Veröffentlicht 14.12.2016 16:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Netgear ≫ D6220 Firmware Version <= 1.0.0.22
Netgear ≫ D6400 Firmware Version <= 1.0.0.56
Netgear ≫ R6250 Firmware Version <= 1.0.4.6_10.1.12
Netgear ≫ R6400 Firmware Version <= 1.0.1.18
Netgear ≫ R6700 Firmware Version <= 1.0.1.14
Netgear ≫ R6900 Firmware Version <= 1.0.1.14
Netgear ≫ R7000 Firmware Version <= 1.0.7.2_1.1.93
Netgear ≫ R7100lg Firmware Version <= 1.0.0.28
Netgear ≫ R7300dst Firmware Version <= 1.0.0.46
Netgear ≫ R7900 Firmware Version <= 1.0.1.8
Netgear ≫ R8000 Firmware Version <= 1.0.3.26
07.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
NETGEAR Multiple Routers Remote Code Execution Vulnerability
SchwachstelleNETGEAR confirmed multiple routers allow unauthenticated web pages to pass form input directly to the command-line interface, permitting remote code execution.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.28% | 0.999 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.