A command execution vulnerability exists in the access control functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:14
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187 - | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
Information
Published : 2023-03-21 18:15
Updated : 2024-11-21 07:14
NVD link : CVE-2022-37337
Mitre link : CVE-2022-37337
CVE.ORG link : CVE-2022-37337
JSON object : View
Products Affected
netgear
- rbs750_firmware
- rbs750
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')