CVE-2016-6277
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
Published
2016-12-14T16:59:00.350
Last Modified
2025-10-22T00:15:54.440
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 8.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
-
Type: Primary
CWE-352
-
Type: Secondary
CWE-352
Affected Vendors & Products
References
-
http://kb.netgear.com/000036386/CVE-2016-582384
Patch, Vendor Advisory
([email protected])
-
http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/94819
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
Broken Link, Mitigation, Third Party Advisory
([email protected])
-
https://kalypto.org/research/netgear-vulnerability-expanded/
Broken Link, Exploit, Third Party Advisory
([email protected])
-
https://www.exploit-db.com/exploits/40889/
Third Party Advisory, VDB Entry
([email protected])
-
https://www.exploit-db.com/exploits/41598/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
https://www.kb.cert.org/vuls/id/582384
Third Party Advisory, US Government Resource
([email protected])
-
http://kb.netgear.com/000036386/CVE-2016-582384
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/94819
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
Broken Link, Mitigation, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://kalypto.org/research/netgear-vulnerability-expanded/
Broken Link, Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/40889/
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/41598/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.kb.cert.org/vuls/id/582384
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6277
(134c704f-9b21-4f2e-91b3-4a467353bcc0)