NETGEAR R6200_V2 firmware versions through R6200v2-V1.0.3.12_10.1.11 and R6300_V2 firmware versions through R6300v2-V1.0.4.52_10.0.93 allow remote authenticated attackers to execute arbitrary command via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameters.
References
Link | Resource |
---|---|
http://r6200v2.com | Broken Link URL Repurposed |
https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-09-07 19:15
Updated : 2024-02-14 01:17
NVD link : CVE-2022-30078
Mitre link : CVE-2022-30078
CVE.ORG link : CVE-2022-30078
JSON object : View
Products Affected
netgear
- r6300_firmware
- r6200
- r6300
- r6200_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')