vendor:
R7000 and R6400
by:
thecarterb, Acew0rm
8,8
CVSS
HIGH
Command Injection
78
CWE
Product Name: R7000 and R6400
Affected Version From: 1.0.7.2_1.1.93
Affected Version To: 1.0.7.2_1.1.93
Patch Exists: YES
Related CWE: CVE-2016-6277
CPE: h:netgear:r7000
Metasploit:
N/A
Other Scripts:
N/A
Tags: cve,cve2016,netgear,rce,iot,kev
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Nuclei References:
https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/, https://nvd.nist.gov/vuln/detail/CVE-2016-6277, http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/, https://www.kb.cert.org/vuls/id/582384, http://kb.netgear.com/000036386/CVE-2016-582384
Nuclei Metadata: {'max-request': 1, 'vendor': 'netgear', 'product': 'd6220_firmware'}
Platforms Tested: Linux, ARMLE
2016
Netgear R7000 and R6400 cgi-bin Command Injection
NETGEAR routers R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly others allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
Mitigation:
Users should upgrade to the latest version of the firmware to mitigate this vulnerability.