First published: Wed Apr 15 2020(Updated: )
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects R6400v2 before 1.0.4.84, R6700 before 1.0.2.8, R6700v3 before 1.0.4.84, R6900 before 1.0.2.8, and R7900 before 1.0.3.10.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6400 firmware | <1.0.4.84 | |
NETGEAR R6400 firmware | =v2 | |
Netgear R6700 Firmware | <1.0.2.8 | |
NETGEAR R6700v1 firmware | ||
Netgear R6700 Firmware | <1.0.4.84 | |
NETGEAR R6700v1 firmware | =v3 | |
Netgear R6900 Firmware | <1.0.2.8 | |
Netgear R6900 Firmware | ||
NETGEAR R7900P firmware | <1.0.3.10 | |
NETGEAR R7900P firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11789 refers to a command injection vulnerability affecting certain NETGEAR devices that can be exploited by unauthenticated attackers.
CVE-2020-11789 is classified as a high severity vulnerability due to its potential for exploitation without authentication.
To fix CVE-2020-11789, update your NETGEAR device firmware to the latest version: R6400v2 to at least 1.0.4.84, R6700 to at least 1.0.2.8, R6900 to at least 1.0.2.8, or R7900 to at least 1.0.3.10.
CVE-2020-11789 affects NETGEAR devices including R6400v2, R6700, R6700v3, R6900, and R7900, all prior to specified firmware versions.
No formal workaround is provided for CVE-2020-11789; the recommended solution is to update the firmware of affected devices.