CVE-2016-6277

Published on: 12/14/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of D6220 from Netgear contain the following vulnerability:

NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.

  • CVE-2016-6277 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 9.3 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Netgear R6400 Remote Code Execution ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html
NetGear Vulnerability Expanded | Kalypto (in)Security Exploit
Third Party Advisory
kalypto.org
text/html
URL Logo MISC kalypto.org/research/netgear-vulnerability-expanded/
Security Advisory for VU 582384, PSV-2016-0245 | Answer | NETGEAR Support Patch
Vendor Advisory
kb.netgear.com
text/html
URL Logo CONFIRM kb.netgear.com/000036386/CVE-2016-582384
Vulnerability Note VU#582384 - Multiple Netgear routers are vulnerable to arbitrary command injection Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#582384
NETGEAR R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 41598
Multiple Netgear Routers VU#582384 Remote Command Injection Vulnerability cve.report (archive)
text/html
URL Logo BID 94819
Netgear R7000 - Command Injection Exploit
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40889
A temporary fix for CERT VU#582384 vulnerability for various Netgear routers (including R6400, R7000, R8000 and similar) | Bas' Blog Mitigation
Third Party Advisory
www.sj-vs.net
text/html
URL Logo MISC www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
HardwareNetgearD6220-AllAllAll
HardwareNetgearD6220-AllAllAll
Operating
System
NetgearD6220 FirmwareAllAllAllAll
HardwareNetgearD6400-AllAllAll
HardwareNetgearD6400-AllAllAll
Operating
System
NetgearD6400 FirmwareAllAllAllAll
HardwareNetgearR6250-AllAllAll
HardwareNetgearR6250-AllAllAll
Operating
System
NetgearR6250 FirmwareAllAllAllAll
HardwareNetgearR6400-AllAllAll
HardwareNetgearR6400-AllAllAll
Operating
System
NetgearR6400 FirmwareAllAllAllAll
HardwareNetgearR6700-AllAllAll
HardwareNetgearR6700-AllAllAll
Operating
System
NetgearR6700 FirmwareAllAllAllAll
HardwareNetgearR6900-AllAllAll
HardwareNetgearR6900-AllAllAll
Operating
System
NetgearR6900 FirmwareAllAllAllAll
HardwareNetgearR7000-AllAllAll
HardwareNetgearR7000-AllAllAll
Operating
System
NetgearR7000 FirmwareAllAllAllAll
HardwareNetgearR7100lg-AllAllAll
HardwareNetgearR7100lg-AllAllAll
Operating
System
NetgearR7100lg FirmwareAllAllAllAll
HardwareNetgearR7300dst-AllAllAll
HardwareNetgearR7300dst-AllAllAll
Operating
System
NetgearR7300dst FirmwareAllAllAllAll
HardwareNetgearR7900-AllAllAll
HardwareNetgearR7900-AllAllAll
Operating
System
NetgearR7900 FirmwareAllAllAllAll
HardwareNetgearR8000-AllAllAll
HardwareNetgearR8000-AllAllAll
Operating
System
NetgearR8000 FirmwareAllAllAllAll
  • cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*: