First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D6100 before 1.0.0.63, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D3600 Firmware | <1.0.0.75 | |
NETGEAR D3600 | ||
Netgear D6000 Firmware | <1.0.0.75 | |
Netgear D6000 | ||
Netgear D6100 Firmware | <1.0.0.63 | |
NETGEAR D6100 | ||
NETGEAR R7800 firmware | <1.0.2.52 | |
NETGEAR R7800 | ||
Netgear R8900 Firmware | <1.0.4.2 | |
NETGEAR R8900 | ||
Netgear R9000 Firmware | <1.0.4.2 | |
NETGEAR R9000 | ||
Netgear Wndr3700 Firmware | <1.0.2.102 | |
Netgear WNDR3700 | =v4 | |
Netgear Wndr4300 Firmware | <1.0.2.104 | |
Netgear Wndr4300 | =v1 | |
Netgear Wndr4300 Firmware | <1.0.0.58 | |
Netgear Wndr4300 | =v2 | |
Netgear Wndr4500 Firmware | <1.0.0.58 | |
Netgear WNDR4500 | =v3 | |
Netgear Wnr2000 Firmware | <1.0.0.68 | |
Netgear WNR2000 | =v5 | |
Netgear Xr500 Firmware | <2.3.2.32 | |
NETGEAR XR500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
NETGEAR devices affected by CVE-2019-20726 include D3600, D6000, D6100, R7800, R8900, R9000, WNDR3700v4, WNDR4300v1, and WNDR4300v2.
The severity of CVE-2019-20726 is medium, with a severity score of 6.8.
An authenticated user can exploit CVE-2019-20726 through command injection.
For D3600, D6000, D6100, R7800, R8900, and R9000, firmware versions up to exclusive 1.0.0.75 and 1.0.2.52 respectively are affected. For WNDR3700v4, WNDR4300v1, and WNDR4300v2, firmware versions up to exclusive 1.0.2.102 and 1.0.2.104 respectively are affected.
You can find more information about CVE-2019-20726 at the following link: https://kb.netgear.com/000061202/Security-Advisory-for-Post-Authentication-Command-on-Some-Routers-and-Gateways-PSV-2018-0141