First published: Wed Feb 22 2017(Updated: )
ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR DGN2200 series firmware | ||
NETGEAR DGN2200B firmware | <=10.0.0.50 | |
NETGEAR DGN2200M | ||
All of | ||
NETGEAR DGN2200B firmware | <=10.0.0.50 | |
NETGEAR DGN2200M | ||
All of | ||
<=10.0.0.50 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6077 has been classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2017-6077, users should upgrade their NETGEAR DGN2200 firmware to the latest version beyond 10.0.0.50.
CVE-2017-6077 affects NETGEAR DGN2200 devices running firmware versions up to 10.0.0.50.
CVE-2017-6077 is a command injection vulnerability that allows remote authenticated users to execute arbitrary OS commands.
The impacted devices include NETGEAR Wireless Router DGN2200 models, particularly those with firmware versions up to 10.0.0.50.