6.8
CVE-2019-20722
- EPSS 0.14%
- Published 16.04.2020 19:15:25
- Last modified 21.11.2024 04:39:11
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.44, DM200 before 1.0.0.58, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBS40 before 2.3.0.28, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32.
Data is provided by the National Vulnerability Database (NVD)
Netgear ≫ D7800 Firmware Version < 1.0.1.44
Netgear ≫ Dm200 Firmware Version < 1.0.0.58
Netgear ≫ R7500 Firmware Version < 1.0.3.38
Netgear ≫ R7800 Firmware Version < 1.0.2.52
Netgear ≫ R8900 Firmware Version < 1.0.4.2
Netgear ≫ R9000 Firmware Version < 1.0.4.2
Netgear ≫ Rbk20 Firmware Version < 2.3.0.28
Netgear ≫ Rbr20 Firmware Version < 2.3.0.28
Netgear ≫ Rbs20 Firmware Version < 2.3.0.28
Netgear ≫ Rbk50 Firmware Version < 2.3.0.32
Netgear ≫ Rbr50 Firmware Version < 2.3.0.32
Netgear ≫ Rbs50 Firmware Version < 2.3.0.32
Netgear ≫ Rbs40 Firmware Version < 2.3.0.28
Netgear ≫ Wndr4300 Firmware Version < 1.0.0.58
Netgear ≫ Wndr4500 Firmware Version < 1.0.0.58
Netgear ≫ Wnr2000 Firmware Version < 1.0.0.68
Netgear ≫ Xr500 Firmware Version < 2.3.2.32
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.347 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 5.2 | 5.1 | 6.4 |
AV:A/AC:L/Au:S/C:P/I:P/A:P
|
cve@mitre.org | 6.8 | 0.9 | 5.9 |
CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.