Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f2mp-9rff-mjgp

Опубликовано: 27 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.28, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.28, and RAX75 before 1.0.3.106.

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.28, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.28, and RAX75 before 1.0.3.106.

EPSS

Процентиль: 34%
0.00136
Низкий

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 8.4
nvd
около 4 лет назад

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.28, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.28, and RAX75 before 1.0.3.106.

CVSS3: 8.4
fstec
около 4 лет назад

Уязвимость встроенного программного обеспечения маршрутизаторов NETGEAR R7900P, R7960P, R8000, R8000P, MR60, RAX20, RAX45, RAX80, MS60, RAX15, RAX50, RAX75, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю выполнить произвольную команду

EPSS

Процентиль: 34%
0.00136
Низкий

Дефекты

CWE-77