Severity
8.8HIGH
EPSS
0.7%
top 27.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 14
Latest updateMay 24

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_bind.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverag

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages44 packages

NVDnetgear/r7800_firmware< 1.0.2.80
CVEListV5netgear/r7800firmware version 1.0.2.76
NVDnetgear/br200_firmware< 5.10.0.5
NVDnetgear/br500_firmware< 5.10.0.5
NVDnetgear/d7800_firmware< 1.0.1.60

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xj23-fxfm-58rq: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R78002022-05-24
CVEList
CVE-2021-27253: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R78002021-04-14
CVE-2021-27253 (HIGH CVSS 8.8) | This vulnerability allows network-a | cvebase.io