Risk | Low |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | N/A |
CWE-ID | CWE-200 CWE-78 CWE-264 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
D8500 Hardware solutions / Routers for home users WNDR4500v2 Hardware solutions / Routers for home users R7000P Hardware solutions / Routers for home users R6400v2 Hardware solutions / Routers for home users R6300v2 Hardware solutions / Routers for home users DGN2200v4 Hardware solutions / Routers for home users R6400 Hardware solutions / Routers for home users R6700 Hardware solutions / Routers for home users R7000 Hardware solutions / Routers for home users R6100 Hardware solutions / Routers for home users R8300 Hardware solutions / Routers for home users R8500 Hardware solutions / Routers for home users D6220 Hardware solutions / Routers for home users R6900P Hardware solutions / Routers for home users R6250 Hardware solutions / Routers for home users D6400 Hardware solutions / Routers for home users R6900 Hardware solutions / Routers for home users R7100LG Hardware solutions / Routers for home users R7300DST Hardware solutions / Routers for home users R7900 Hardware solutions / Routers for home users R8000 Hardware solutions / Routers for home users D7800 Hardware solutions / Routers for home users EX6200v2 Hardware solutions / Routers for home users R7800 Hardware solutions / Routers for home users R7500v2 Hardware solutions / Routers for home users R7500 Hardware solutions / Routers for home users Other |
Vendor |
NETGEAR |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU10433
Risk: Low
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw in the genie_restoring.cgi script, provided by the box's built-in web server. An adjacent attacker can abuse the vulnerable script and extract files and passwords from its filesystem in flash storage or pull files from USB sticks plugged into the router.
Update to the latest version.
Vulnerable software versionsD8500: All versions
WNDR4500v2: All versions
R7000P: All versions
R6400v2: All versions
R6300v2: All versions
DGN2200v4: All versions
R6400: All versions
R6700: All versions
: All versions
R7000: All versions
: All versions
: All versions
: All versions
: All versions
: All versions
: All versions
: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10434
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows an local root-privileged attacker to execute shell commands on the target system.
The weakness exists due to post-authentication command injection. A local attacker can use the device_name parameter on the lan.cgi page to inject and execute arbitrary commands with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Update to the latest version.
Vulnerable software versionsD8500: All versions
R6100: All versions
R6400v2: All versions
R6400: All versions
R8300: All versions
R8500: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10436
Risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass authentication on the target system.
The weakness exists due to improper privileges and access controls. A local attacker can bypass authentication if "&genie=1" is found within the query string.
Update to the latest version.
Vulnerable software versionsD6220: All versions
: All versions
: All versions
R6400: All versions
R6400v2: All versions
: All versions
: All versions
R7000P: All versions
R7000: All versions
: All versions
: All versions
: All versions
: All versions
: All versions
: All versions
R6900P: All versions
R6250: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10438
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows an local attacker to execute shell commands on the target system.
The weakness exists due to command injection. A local attacker can use the device_name parameter on the lan.cgi page to inject and execute arbitrary commands with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Update to the latest version.
Vulnerable software versionsD6220: All versions
D8500: All versions
D6400: All versions
R6250: All versions
R6400: All versions
R6400v2: All versions
R6700: All versions
R6900P: All versions
R6900: All versions
R7000P: All versions
R7000: All versions
R7100LG: All versions
R7300DST: All versions
R7900: All versions
R8000: All versions
R8300: All versions
R8500: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10440
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows an local root-privileged attacker to execute shell commands on the target system.
The weakness exists due to post-authentication command injection. A local attacker can inject and execute arbitrary commands with root privileges during short time window when WPS is activated.
Successful exploitation of the vulnerability may result in system compromise.
Update to the latest version.
Vulnerable software versionsR6100: All versions
D7800: All versions
EX6200v2: All versions
R7800: All versions
R7500v2: All versions
R7500: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.