CVE-2022-30078

NETGEAR R6200_V2 firmware versions through R6200v2-V1.0.3.12_10.1.11 and R6300_V2 firmware versions through R6300v2-V1.0.4.52_10.0.93 allow remote authenticated attackers to execute arbitrary command via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameters.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:r6200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r6200:v2:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://r6200v2.comĀ - Broken Link (MISC) http://r6200v2.comĀ - Broken Link, URL Repurposed

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-77 CWE-78

Information

Published : 2022-09-07 19:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-30078

Mitre link : CVE-2022-30078

CVE.ORG link : CVE-2022-30078


JSON object : View

Products Affected

netgear

  • r6200_firmware
  • r6300
  • r6300_firmware
  • r6200
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')