7.2
CVE-2021-38519
- EPSS 0.16%
- Published 11.08.2021 00:15:40
- Last modified 21.11.2024 06:17:18
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6250 before 1.0.4.36, R6300v2 before 1.0.4.36, R6400 before 1.0.1.50, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R6700 before 1.0.2.8, R6900 before 1.0.2.8, R7000 before 1.0.9.88, R6900P before 1.3.2.132, R7100LG before 1.0.0.52, R7900 before 1.0.3.10, R8000 before 1.0.4.46, R7900P before 1.4.1.50, R8000P before 1.4.1.50, and RAX80 before 1.0.1.40.
Data is provided by the National Vulnerability Database (NVD)
Netgear ≫ R6250 Firmware Version < 1.0.4.36
Netgear ≫ R6300 Firmware Version < 1.0.4.36
Netgear ≫ R6400 Firmware Version < 1.0.1.50
Netgear ≫ R6400v2 Firmware Version < 1.0.2.66
Netgear ≫ R6700 Firmware Version < 1.0.2.66
Netgear ≫ R6700 Firmware Version < 1.0.2.8
Netgear ≫ R6900 Firmware Version < 1.0.2.8
Netgear ≫ R7000 Firmware Version < 1.0.9.88
Netgear ≫ R6900p Firmware Version < 1.3.2.132
Netgear ≫ R7100lg Firmware Version < 1.0.0.52
Netgear ≫ R7900 Firmware Version < 1.0.3.10
Netgear ≫ R8000 Firmware Version < 1.0.4.46
Netgear ≫ R7900p Firmware Version < 1.4.1.50
Netgear ≫ R8000p Firmware Version < 1.4.1.50
Netgear ≫ Rax80 Firmware Version < 1.0.1.40
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.371 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
cve@mitre.org | 6.3 | 0.8 | 5.5 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.