First published: Wed Dec 14 2016(Updated: )
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D6220 Firmware | <=1.0.0.22 | |
NETGEAR R6400v2 | <=1.0.0.56 | |
netgear R6250 Firmware | <=1.0.4.6_10.1.12 | |
Netgear R6400 Firmware | <=1.0.1.18 | |
Netgear R6700 Firmware | <=1.0.1.14 | |
Netgear R6900 Firmware | <=1.0.1.14 | |
Netgear R7000 Firmware | <=1.0.7.2_1.1.93 | |
Netgear R7100lg Firmware | <=1.0.0.28 | |
Netgear R7300dst Firmware | <=1.0.0.46 | |
Netgear R7900 Firmware | <=1.0.1.8 | |
Netgear R8000 Firmware | <=1.0.3.26 | |
NETGEAR D6220 | ||
Netgear D6400 | ||
NETGEAR R6250 | ||
NETGEAR R6400 | ||
NETGEAR R6700 | ||
Netgear R6900 | ||
NETGEAR R7000 | ||
Netgear R7100LG | ||
Netgear R7300dst | ||
Netgear R7900 | ||
NETGEAR R8000 | ||
All of | ||
Netgear D6220 Firmware | <=1.0.0.22 | |
NETGEAR D6220 | ||
All of | ||
Netgear D6400 Firmware | <=1.0.0.56 | |
Netgear D6400 | ||
All of | ||
netgear R6250 Firmware | <=1.0.4.6_10.1.12 | |
NETGEAR R6250 | ||
All of | ||
Netgear R6400 Firmware | <=1.0.1.18 | |
NETGEAR R6400 | ||
All of | ||
Netgear R6700 Firmware | <=1.0.1.14 | |
NETGEAR R6700 | ||
All of | ||
Netgear R6900 Firmware | <=1.0.1.14 | |
Netgear R6900 | ||
All of | ||
Netgear R7000 Firmware | <=1.0.7.2_1.1.93 | |
NETGEAR R7000 | ||
All of | ||
Netgear R7100lg Firmware | <=1.0.0.28 | |
Netgear R7100LG | ||
All of | ||
Netgear R7300dst Firmware | <=1.0.0.46 | |
Netgear R7300dst | ||
All of | ||
Netgear R7900 Firmware | <=1.0.1.8 | |
Netgear R7900 | ||
All of | ||
Netgear R8000 Firmware | <=1.0.3.26 | |
NETGEAR R8000 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.