NETGEAR R6200_V2 firmware versions through R6200v2-V1.0.3.12_10.1.11 and R6300_V2 firmware versions through R6300v2-V1.0.4.52_10.0.93 allow remote authenticated attackers to execute arbitrary command via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameters.
References
Link | Resource |
---|---|
https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
http://r6200v2.com | Broken Link |
Information
Published : 2022-09-07 12:15
Updated : 2022-09-12 11:36
NVD link : CVE-2022-30078
Mitre link : CVE-2022-30078
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
netgear
- r6200
- r6200_firmware
- r6300_firmware
- r6300