First published: Wed Apr 22 2020(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R8900 before 1.0.4.12, and R9000 before 1.0.4.12.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D7800 | <1.0.1.44 | |
NETGEAR D7800 Firmware | ||
NETGEAR R7500v2 firmware | <1.0.3.38 | |
NETGEAR R7500v2 firmware | =v2 | |
NETGEAR R7800 firmware | <1.0.2.52 | |
NETGEAR R7800 firmware | ||
NETGEAR R8900 firmware | <1.0.4.12 | |
NETGEAR R8900 | ||
NETGEAR R9000 firmware | <1.0.4.12 | |
NETGEAR R9000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-21112 is considered a high-severity vulnerability due to its command injection nature which can be exploited by authenticated users.
To fix CVE-2018-21112, upgrade your NETGEAR device to the latest firmware version as specified for each affected model.
CVE-2018-21112 affects NETGEAR D7800, R7500v2, R7800, R8900, and R9000 models before their respective firmware versions.
No, CVE-2018-21112 requires authenticated access to be exploited, making it less of a risk from external threats.
CVE-2018-21112 is a command injection vulnerability that allows authenticated users to execute arbitrary commands on affected devices.