CVE-2022-27945

NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to password.cgi.
References
Link Resource
https://github.com/donothingme/VUL/blob/main/vul2/2.md Exploit Patch Third Party Advisory
https://github.com/donothingme/VUL/blob/main/vul2/2.md Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:r8500_firmware:1.0.2.158:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:56

Type Values Removed Values Added
References () https://github.com/donothingme/VUL/blob/main/vul2/2.md - Exploit, Patch, Third Party Advisory () https://github.com/donothingme/VUL/blob/main/vul2/2.md - Exploit, Patch, Third Party Advisory

Information

Published : 2022-03-26 17:15

Updated : 2024-11-21 06:56


NVD link : CVE-2022-27945

Mitre link : CVE-2022-27945

CVE.ORG link : CVE-2022-27945


JSON object : View

Products Affected

netgear

  • r8500_firmware
  • r8500
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')