CVE-2016-6277
Summary
| CVE | CVE-2016-6277 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-12-14 16:59:00 UTC |
| Updated | 2026-04-21 16:23:17 UTC |
| Description | NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.943280000 probability, percentile 0.999520000 (date 2026-04-23)
CISA KEV: Listed on 2022-03-07; due 2022-09-07; ransomware use Unknown
Problem Types: CWE-352 | n/a | CWE-352 CWE-352 Cross-Site Request Forgery (CSRF)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 3.1 | ADP | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:N/C:C/I:C/A:C
CISA Known Exploited Vulnerability
| Vendor | NETGEAR |
|---|---|
| Product | Multiple Routers |
| Name | NETGEAR Multiple Routers Remote Code Execution Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2016-6277 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Netgear | D6220 | - | All | All | All |
| Operating System | Netgear | D6220 Firmware | All | All | All | All |
| Hardware | Netgear | D6400 | - | All | All | All |
| Operating System | Netgear | D6400 Firmware | All | All | All | All |
| Hardware | Netgear | R6250 | - | All | All | All |
| Operating System | Netgear | R6250 Firmware | All | All | All | All |
| Hardware | Netgear | R6400 | - | All | All | All |
| Operating System | Netgear | R6400 Firmware | All | All | All | All |
| Hardware | Netgear | R6700 | - | All | All | All |
| Operating System | Netgear | R6700 Firmware | All | All | All | All |
| Hardware | Netgear | R6900 | - | All | All | All |
| Operating System | Netgear | R6900 Firmware | All | All | All | All |
| Hardware | Netgear | R7000 | - | All | All | All |
| Operating System | Netgear | R7000 Firmware | All | All | All | All |
| Hardware | Netgear | R7100lg | - | All | All | All |
| Operating System | Netgear | R7100lg Firmware | All | All | All | All |
| Hardware | Netgear | R7300dst | - | All | All | All |
| Operating System | Netgear | R7300dst Firmware | All | All | All | All |
| Hardware | Netgear | R7900 | - | All | All | All |
| Operating System | Netgear | R7900 Firmware | All | All | All | All |
| Hardware | Netgear | R8000 | - | All | All | All |
| Operating System | Netgear | R8000 Firmware | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.cisa.gov/known-exploited-vulnerabilities-catalog | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | www.cisa.gov | US Government Resource |
| NetGear Vulnerability Expanded | Kalypto (in)Security | af854a3a-2127-422b-91ae-364da2661108 | kalypto.org | Broken Link, Exploit, Third Party Advisory |
| Vulnerability Note VU#582384 - Multiple Netgear routers are vulnerable to arbitrary command injection | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | Third Party Advisory, US Government Resource |
| Security Advisory for VU 582384, PSV-2016-0245 | Answer | NETGEAR Support | af854a3a-2127-422b-91ae-364da2661108 | kb.netgear.com | Patch, Vendor Advisory |
| Multiple Netgear Routers VU#582384 Remote Command Injection Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| Netgear R7000 - Command Injection | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Third Party Advisory, VDB Entry |
| A temporary fix for CERT VU#582384 vulnerability for various Netgear routers (including R6400, R7000, R8000 and similar) | Bas' Blog | af854a3a-2127-422b-91ae-364da2661108 | www.sj-vs.net | Broken Link, Mitigation, Third Party Advisory |
| Netgear R6400 Remote Code Execution ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| NETGEAR R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| ADP | 2022-03-07T00:00:00.000Z | CVE-2016-6277 added to CISA KEV |
There are currently no legacy QID mappings associated with this CVE.