9.8
CVE-2019-20730
- EPSS 0.4%
- Veröffentlicht 16.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 04:39:12
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Certain NETGEAR devices are affected by SQL injection. This affects D3600 before 1.0.0.68, D6000 before 1.0.0.68, D6200 before 1.1.00.28, D6220 before 1.0.0.40, D6400 before 1.0.0.74, D7000 before 1.0.1.60, D7000v2 before 1.0.0.74, D7800 before 1.0.1.34, D8500 before 1.0.3.39, DC112A before 1.0.0.40, EX8000 before 1.0.0.118, JR6150 before 1.0.1.18, R6050 before 1.0.1.18, R6220 before 1.1.0.66, R6250 before 1.0.4.26, R6300v2 before 1.0.4.24, R6400 before 1.0.1.36, R6400v2 before 1.0.2.52, R6700 before 1.0.1.44, R6700v2 before 1.2.0.16, R6800 before 1.2.0.16, R6900v2 before 1.2.0.16, R6900 before 1.0.1.44, R7000 before 1.0.9.26, R6900P before 1.3.0.20, R7000P before 1.3.0.20, R7100LG before 1.0.0.40, R7300DST before 1.0.0.62, R7500 before 1.0.0.118, R7500v2 before 1.0.3.26, R7800 before 1.0.2.40, R7900 before 1.0.2.10, R8000 before 1.0.4.12, R7900P before 1.3.0.10, R8000P before 1.3.0.10, R8300 before 1.0.2.116, R8500 before 1.0.2.116, R8900 before 1.0.3.6, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.102, WNDR3700v5 before 1.1.0.54, WNDR4300v1 before 1.0.2.98, WNDR4300v2 before 1.0.0.56, and WNDR4500v3 before 1.0.0.56.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Netgear ≫ D3600 Firmware Version < 1.0.0.68
Netgear ≫ D6000 Firmware Version < 1.0.0.68
Netgear ≫ D6200 Firmware Version < 1.1.00.28
Netgear ≫ D6220 Firmware Version < 1.0.0.40
Netgear ≫ D6400 Firmware Version < 1.0.0.74
Netgear ≫ D7000 Firmware Version < 1.0.1.60
Netgear ≫ D7000 Firmware Version < 1.0.0.74
Netgear ≫ D7800 Firmware Version < 1.0.1.34
Netgear ≫ D8500 Firmware Version < 1.0.3.39
Netgear ≫ Dc112a Firmware Version < 1.0.0.40
Netgear ≫ Ex8000 Firmware Version < 1.0.0.118
Netgear ≫ Jr6150 Firmware Version < 1.0.1.18
Netgear ≫ R6050 Firmware Version < 1.0.1.18
Netgear ≫ R6220 Firmware Version < 1.1.0.66
Netgear ≫ R6250 Firmware Version < 1.0.4.26
Netgear ≫ R6300 Firmware Version < 1.0.4.24
Netgear ≫ R6400 Firmware Version < 1.0.1.36
Netgear ≫ R6400 Firmware Version < 1.0.2.52
Netgear ≫ R6700 Firmware Version < 1.0.1.44
Netgear ≫ R6700 Firmware Version < 1.2.0.16
Netgear ≫ R6800 Firmware Version < 1.2.0.16
Netgear ≫ R6900 Firmware Version < 1.2.0.16
Netgear ≫ R6900 Firmware Version < 1.0.1.44
Netgear ≫ R7000 Firmware Version < 1.0.9.26
Netgear ≫ R6900p Firmware Version < 1.3.0.20
Netgear ≫ R7000p Firmware Version < 1.3.0.20
Netgear ≫ R7100lg Firmware Version < 1.0.0.40
Netgear ≫ R7300dst Firmware Version < 1.0.0.62
Netgear ≫ R7500 Firmware Version < 1.0.0.118
Netgear ≫ R7500 Firmware Version < 1.0.3.26
Netgear ≫ R7800 Firmware Version < 1.0.2.40
Netgear ≫ R7900 Firmware Version < 1.0.2.10
Netgear ≫ R8000 Firmware Version < 1.0.4.12
Netgear ≫ R7900p Firmware Version < 1.3.0.10
Netgear ≫ R8000p Firmware Version < 1.3.0.10
Netgear ≫ R8300 Firmware Version < 1.0.2.116
Netgear ≫ R8500 Firmware Version < 1.0.2.116
Netgear ≫ R8900 Firmware Version < 1.0.3.6
Netgear ≫ R9000 Firmware Version < 1.0.3.10
Netgear ≫ Wndr3700 Firmware Version < 1.0.2.102
Netgear ≫ Wndr3700 Firmware Version < 1.1.0.54
Netgear ≫ Wndr4300 Firmware Version < 1.0.2.98
Netgear ≫ Wndr4300 Firmware Version < 1.0.0.56
Netgear ≫ Wndr4500 Firmware Version < 1.0.0.56
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.4% | 0.595 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
cve@mitre.org | 8.2 | 3.9 | 4.2 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.