Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jr9p-69mv-mf2m

Опубликовано: 01 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.6
CVSS3: 7.2

Описание

An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication.

An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication.

EPSS

Процентиль: 99%
0.7314
Высокий

8.6 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.2
nvd
6 месяцев назад

An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication.

CVSS3: 7.2
fstec
больше 13 лет назад

Уязвимость сценария setup.cgi микропрограммного обеспечения маршрутизаторов Netgear DGN1000B, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 99%
0.7314
Высокий

8.6 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-78