9.8
CVE-2018-21162
- EPSS 0.37%
- Veröffentlicht 23.04.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:03:03
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D6400 before 1.0.0.78, EX6200 before 1.0.3.86, EX7000 before 1.0.0.64, R6250 before 1.0.4.8, R6300v2 before 1.0.4.6, R6400 before 1.0.1.12, R6700 before 1.0.1.16, R7000 before 1.0.7.10, R7100LG before 1.0.0.42, R7300DST before 1.0.0.44, R7900 before 1.0.1.12, R8000 before 1.0.3.36, R8300 before 1.0.2.74, R8500 before 1.0.2.74, WNDR3400v3 before 1.0.1.14, and WNR3500Lv2 before 1.2.0.48.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Netgear ≫ D6400 Firmware Version < 1.0.0.78
Netgear ≫ Ex6200 Firmware Version < 1.0.3.86
Netgear ≫ Ex7000 Firmware Version < 1.0.0.64
Netgear ≫ R6250 Firmware Version < 1.0.4.8
Netgear ≫ R6300 Firmware Version < 1.0.4.6
Netgear ≫ R6400 Firmware Version < 1.0.1.12
Netgear ≫ R6700 Firmware Version < 1.0.1.16
Netgear ≫ R7000 Firmware Version < 1.0.7.10
Netgear ≫ R7100lg Firmware Version < 1.0.0.42
Netgear ≫ R7300dst Firmware Version < 1.0.0.44
Netgear ≫ R7900 Firmware Version < 1.0.1.12
Netgear ≫ R8000 Firmware Version < 1.0.3.36
Netgear ≫ R8300 Firmware Version < 1.0.2.74
Netgear ≫ R8500 Firmware Version < 1.0.2.74
Netgear ≫ Wndr3400 Firmware Version < 1.0.1.14
Netgear ≫ Wnr3500l Firmware Version < 1.2.0.48
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.37% | 0.583 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
cve@mitre.org | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.