First published: Tue Mar 23 2021(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects XR450 before 2.3.2.114, XR500 before 2.3.2.114, and WNR2000v5 before 1.0.0.76.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7800 | <2.3.2.114 | |
NETGEAR R7800 | ||
Netgear Xr500 Firmware | <2.3.2.114 | |
NETGEAR XR500 | ||
Netgear Wnr2000v5 Firmware | <1.0.0.76 | |
NETGEAR WNR2000v5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29069 is a vulnerability that allows an authenticated user to execute arbitrary commands on certain NETGEAR devices.
CVE-2021-29069 affects XR450 firmware versions before 2.3.2.114, XR500 firmware versions before 2.3.2.114, and WNR2000v5 firmware versions before 1.0.0.76.
CVE-2021-29069 has a severity rating of 8.4, which is considered high.
To fix CVE-2021-29069, make sure to update your XR450, XR500, or WNR2000v5 firmware to versions 2.3.2.114, 2.3.2.114, and 1.0.0.76 respectively.
You can find more information about CVE-2021-29069 in the Netgear Security Advisory located at https://kb.netgear.com/000063023/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2020-0595.