6.8
CVE-2018-21225
- EPSS 0.14%
- Published 28.04.2020 17:15:13
- Last modified 21.11.2024 04:03:13
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7000 before 1.0.1.60, D7800 before 1.0.1.34, D8500 before 1.0.3.39, R6700 before 1.0.1.30, R6700v2 before 1.2.0.16, R6800 before 1.2.0.16, R6900 before 1.0.1.30, R6900P before 1.2.0.22, R6900v2 before 1.2.0.16, R7000 before 1.0.9.12, R7000P before 1.2.0.22, R7500v2 before 1.0.3.20, R7800 before 1.0.2.44, R8300 before 1.0.2.106, R8500 before 1.0.2.106, and R9000 before 1.0.2.52.
Data is provided by the National Vulnerability Database (NVD)
Netgear ≫ D7800 Firmware Version < 1.0.1.34
Netgear ≫ D7000 Firmware Version < 1.0.1.60
Netgear ≫ D8500 Firmware Version < 1.0.3.39
Netgear ≫ R6700 Firmware Version < 1.0.1.30
Netgear ≫ R6700 Firmware Version < 1.2.0.16
Netgear ≫ R6800 Firmware Version < 1.2.0.16
Netgear ≫ R6900 Firmware Version < 1.0.1.30
Netgear ≫ R6900 Firmware Version < 1.2.0.16
Netgear ≫ R6900p Firmware Version < 1.2.0.22
Netgear ≫ R7000 Firmware Version < 1.0.9.12
Netgear ≫ R7000p Firmware Version < 1.2.0.22
Netgear ≫ R7500 Firmware Version < 1.0.3.20
Netgear ≫ R7800 Firmware Version < 1.0.2.44
Netgear ≫ R8300 Firmware Version < 1.0.2.106
Netgear ≫ R8500 Firmware Version < 1.0.2.106
Netgear ≫ R9000 Firmware Version < 1.0.2.52
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.3 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 5.2 | 5.1 | 6.4 |
AV:A/AC:L/Au:S/C:P/I:P/A:P
|
cve@mitre.org | 6.8 | 0.9 | 5.9 |
CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.