8.8

CVE-2021-45546

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, and RBS850 before 3.2.17.12.

Data is provided by the National Vulnerability Database (NVD)
NetgearR7850 Firmware Version < 1.0.5.74
   NetgearR7850 Version-
NetgearR7900p Firmware Version < 1.4.2.84
   NetgearR7900p Version-
NetgearR7960p Firmware Version < 1.4.2.84
   NetgearR7960p Version-
NetgearR8000 Firmware Version < 1.0.4.74
   NetgearR8000 Version-
NetgearR8000p Firmware Version < 1.4.2.84
   NetgearR8000p Version-
NetgearRax200 Firmware Version < 1.0.4.120
   NetgearRax200 Version-
NetgearRax75 Firmware Version < 1.0.4.120
   NetgearRax75 Version-
NetgearRax80 Firmware Version < 1.0.4.120
   NetgearRax80 Version-
NetgearRbk852 Firmware Version < 3.2.17.12
   NetgearRbk852 Version-
NetgearRbr850 Firmware Version < 3.2.17.12
   NetgearRbr850 Version-
NetgearRbs850 Firmware Version < 3.2.17.12
   NetgearRbs850 Version-
NetgearRbk752 Firmware Version < 3.2.17.12
   NetgearRbk752 Version-
NetgearRbr750 Firmware Version < 3.2.17.12
   NetgearRbr750 Version-
NetgearRbs750 Firmware Version < 3.2.17.12
   NetgearRbs750 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.54% 0.648
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
cve@mitre.org 8.4 1.7 6
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.