6.8

CVE-2018-21114

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.44, EX6150v2 before 1.0.1.70, EX6100v2 before 1.0.1.70, EX6200v2 before 1.0.1.64, EX7300 before 1.0.2.136, EX6400 before 1.0.2.136, R6100 before 1.0.1.16, R7500 before 1.0.0.110, R7800 before 1.0.2.32, R9000 before 1.0.4.12, WN3000RPv2 before 1.0.0.56, WN3000RPv3 before 1.0.2.52, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.

Data is provided by the National Vulnerability Database (NVD)
NetgearD7800 Firmware Version < 1.0.1.44
   NetgearD7800 Version-
NetgearEx6150 Firmware Version < 1.0.1.70
   NetgearEx6150 Versionv2
NetgearEx6100 Firmware Version < 1.0.1.70
   NetgearEx6100 Versionv2
NetgearEx6200 Firmware Version < 1.0.1.64
   NetgearEx6200 Versionv2
NetgearEx7300 Firmware Version < 1.0.2.136
   NetgearEx7300 Version-
NetgearEx6400 Firmware Version < 1.0.2.136
   NetgearEx6400 Version-
NetgearR6100 Firmware Version < 1.0.1.16
   NetgearR6100 Version-
NetgearR7500 Firmware Version < 1.0.0.110
   NetgearR7500 Version-
NetgearR7800 Firmware Version < 1.0.2.32
   NetgearR7800 Version-
NetgearR9000 Firmware Version < 1.0.4.12
   NetgearR9000 Version-
NetgearWn3000rp Firmware Version < 1.0.0.56
   NetgearWn3000rp Versionv2
NetgearWn3000rp Firmware Version < 1.0.2.52
   NetgearWn3000rp Versionv3
NetgearWndr4300 Firmware Version < 1.0.0.50
   NetgearWndr4300 Versionv2
NetgearWndr4500 Firmware Version < 1.0.0.50
   NetgearWndr4500 Versionv3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.3
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 0.9 5.9
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 5.2 5.1 6.4
AV:A/AC:L/Au:S/C:P/I:P/A:P
cve@mitre.org 6.8 0.9 5.9
CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.