First published: Tue Apr 21 2020(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.34, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.54, and WNDR4500v3 before 1.0.0.54.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D7800 | <1.0.1.34 | |
NETGEAR D7800 Firmware | ||
NETGEAR R7800 firmware | <1.0.2.42 | |
NETGEAR R7800 firmware | ||
NETGEAR R8900 firmware | <1.0.3.10 | |
NETGEAR R8900 | ||
NETGEAR R9000 firmware | <1.0.3.10 | |
NETGEAR R9000 firmware | ||
NETGEAR WNDR4300v2 firmware | <1.0.0.54 | |
NETGEAR wndr4300v2 | =v2 | |
NETGEAR WNDR4500 firmware | <1.0.0.54 | |
NETGEAR WNDR4500v3 | =v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-21146 is classified as a critical vulnerability due to its potential for command injection by an authenticated user.
To fix CVE-2018-21146, users should upgrade their NETGEAR devices to the latest firmware version that addresses the vulnerability.
CVE-2018-21146 affects NETGEAR D7800, R7800, R8900, R9000, WNDR4300v2, and WNDR4500v3 devices running specific firmware versions prior to the updates.
CVE-2018-21146 requires authentication, so an attacker must have access to valid credentials to exploit this vulnerability.
As a temporary measure, users can restrict access to the affected NETGEAR devices to trusted networks only until they can apply the firmware update.