First published: Fri Apr 24 2020(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.34, EX6100v2 before 1.0.1.50, EX6150v2 before 1.0.1.50, EX6200v2 before 1.0.1.44, EX6400 before 1.0.1.60, EX7300 before 1.0.1.60, R6100 before 1.0.1.16, R7500 before 1.0.0.110, R7800 before 1.0.2.32, R9000 before 1.0.2.30, WN3000RPv3 before 1.0.2.50, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D7800 Firmware | <1.0.1.34 | |
Netgear D7800 | ||
Netgear Ex6100 Firmware | <1.0.1.50 | |
Netgear EX6100 | =v2 | |
NETGEAR R7800 | <1.0.1.50 | |
Netgear Ex6150 | =v2 | |
Netgear Ex6200 Firmware | <1.0.1.44 | |
Netgear EX6200 | =v2 | |
Netgear Ex6400 Firmware | <1.0.1.60 | |
Netgear Ex6400 | ||
Netgear Ex7300 Firmware | <1.0.1.60 | |
Netgear Ex7300 | ||
Netgear R6100 Firmware | <1.0.1.16 | |
Netgear R6100 | ||
Netgear R7500 Firmware | <1.0.0.110 | |
Netgear R7500 | ||
NETGEAR R7800 firmware | <1.0.2.32 | |
NETGEAR R7800 | ||
Netgear R9000 Firmware | <1.0.2.30 | |
NETGEAR R9000 | ||
Netgear Wn3000rp Firmware | <1.0.2.50 | |
Netgear Wn3000rp | =v3 | |
Netgear Wndr4300 Firmware | <1.0.0.50 | |
Netgear Wndr4300 | =v2 | |
Netgear Wndr4500 Firmware | <1.0.0.50 | |
Netgear WNDR4500 | =v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this command injection vulnerability is CVE-2018-21228.
Certain NETGEAR devices are affected by this command injection vulnerability, including D7800, EX6100v2, EX6150v2, EX6200v2, EX6400, EX7300, R6100, R7500, and R7800.
The severity of CVE-2018-21228 is medium with a CVSS score of 6.8.
To fix the CVE-2018-21228 vulnerability, it is recommended to update your device firmware to the latest version provided by NETGEAR.
You can find more information about CVE-2018-21228 in the [NETGEAR Security Advisory](https://kb.netgear.com/000055106/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-0607).