First published: Wed Aug 11 2021(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400 before 1.0.1.52, R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, and R7000P before 1.3.2.124.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6400 Firmware | <1.0.1.52 | |
NETGEAR R6400 | ||
Netgear R6400 Firmware | <1.0.4.84 | |
NETGEAR R6400 | =v2 | |
Netgear R6700 Firmware | <1.2.0.62 | |
NETGEAR R6700 | =v2 | |
Netgear R6900 Firmware | <1.2.0.62 | |
Netgear R6900 | =v2 | |
Netgear R7000p Firmware | <1.3.2.124 | |
Netgear R7000P | ||
Netgear R6700 Firmware | <1.0.4.84 | |
NETGEAR R6700 | =v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Certain NETGEAR devices are affected by command injection, including R6400 before 1.0.1.52, R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, and R7000P before 1.3.2.124.
The severity of CVE-2021-38520 is high with a CVSS score of 7.2.
The command injection vulnerability in certain NETGEAR devices allows an authenticated user to execute arbitrary commands on the device.
To fix CVE-2021-38520, update your NETGEAR device firmware to the specified versions: R6400 - 1.0.1.52, R6400v2 - 1.0.4.84, R6700v3 - 1.0.4.84, R6700v2 - 1.2.0.62, R6900v2 - 1.2.0.62, and R7000P - 1.3.2.124.
You can find more information about CVE-2021-38520 at the following reference link: [https://kb.netgear.com/000063763/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0565](https://kb.netgear.com/000063763/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0565)