NETGEAR R6200_V2 firmware versions through R6200v2-V1.0.3.12_10.1.11 and R6300_V2 firmware versions through R6300v2-V1.0.4.52_10.0.93 allow remote authenticated attackers to execute arbitrary command via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameters.
References
Link | Resource |
---|---|
http://r6200v2.com | Broken Link URL Repurposed |
https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
http://r6200v2.com | Broken Link URL Repurposed |
https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://r6200v2.com - Broken Link, URL Repurposed | |
References | () https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md - Exploit, Third Party Advisory | |
References | () https://www.netgear.com/about/security/ - Vendor Advisory |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://r6200v2.com - Broken Link, URL Repurposed |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
Information
Published : 2022-09-07 19:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30078
Mitre link : CVE-2022-30078
CVE.ORG link : CVE-2022-30078
JSON object : View
Products Affected
netgear
- r6300
- r6300_firmware
- r6200_firmware
- r6200
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')