8.4
CVE-2017-18849
- EPSS 0.25%
- Published 20.04.2020 16:15:13
- Last modified 21.11.2024 03:21:05
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Certain NETGEAR devices are affected by command injection. This affects D6220 before 1.0.0.26, D6400 before 1.0.0.60, D8500 before 1.0.3.29, R6250 before 1.0.4.12, R6400 before 1.01.24, R6400v2 before 1.0.2.30, R6700 before 1.0.1.22, R6900 before 1.0.1.22, R6900P before 1.0.0.56, R7000 before 1.0.9.4, R7000P before 1.0.0.56, R7100LG before 1.0.0.32, R7300DST before 1.0.0.54, R7900 before 1.0.1.18, R8000 before 1.0.3.44, R8300 before 1.0.2.100_1.0.82, and R8500 before 1.0.2.100_1.0.82.
Data is provided by the National Vulnerability Database (NVD)
Netgear ≫ D6220 Firmware Version < 1.0.0.26
Netgear ≫ D6400 Firmware Version < 1.0.0.60
Netgear ≫ D8500 Firmware Version < 1.0.3.29
Netgear ≫ R6250 Firmware Version < 1.0.4.12
Netgear ≫ R6400 Firmware Version < 1.01.24
Netgear ≫ R6400 Firmware Version < 1.0.2.30
Netgear ≫ R6700 Firmware Version < 1.0.1.22
Netgear ≫ R6900 Firmware Version < 1.0.1.22
Netgear ≫ R6900p Firmware Version < 1.0.0.56
Netgear ≫ R7000 Firmware Version < 1.0.9.4
Netgear ≫ R7000p Firmware Version < 1.0.0.56
Netgear ≫ R7100lg Firmware Version < 1.0.0.32
Netgear ≫ R7300dst Firmware Version < 1.0.0.54
Netgear ≫ R7900 Firmware Version < 1.0.1.18
Netgear ≫ R8000 Firmware Version < 1.0.3.44
Netgear ≫ R8300 Firmware Version < 1.0.2.100_1.0.82
Netgear ≫ R8500 Firmware Version < 1.0.2.100_1.0.82
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.25% | 0.484 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
cve@mitre.org | 8.4 | 2.5 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.