NETGEAR routers command execution |
NAME
NETGEAR routers command execution
- Platforms Affected:
NETGEAR MK62
NETGEAR MS60
NETGEAR R7900
NETGEAR R7960P
NETGEAR RAX20
NETGEAR RAX45
NETGEAR MR60
NETGEAR R7900P - Risk Level:
8.4 - Exploitability:
Unproven - Consequences:
Gain Access
DESCRIPTION
NETGEAR routers could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by an unspecified flaw. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVSS 3.0 Information
- Privileges Required: High
- User Interaction: None
- Scope: Changed
- Access Vector: Adjacent Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Refer to NETGEAR Security Advisory: PSV-2020-0223 for patch, upgrade or suggested workaround information. See References.
- Reference Link:
https://kb.netgear.com/000064769/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0223?article=000064769 - Reference Link:
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.