CVE-2019-20724
Summary
| CVE | CVE-2019-20724 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-04-16 19:15:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D6100 before 1.0.0.63, D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBS40 before 2.3.0.28, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32. |
Risk And Classification
Problem Types: CWE-77
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Netgear | D3600 | - | All | All | All |
| Hardware | Netgear | D3600 | - | All | All | All |
| Operating System | Netgear | D3600 Firmware | All | All | All | All |
| Operating System | Netgear | D3600 Firmware | All | All | All | All |
| Hardware | Netgear | D6000 | - | All | All | All |
| Hardware | Netgear | D6000 | - | All | All | All |
| Operating System | Netgear | D6000 Firmware | All | All | All | All |
| Operating System | Netgear | D6000 Firmware | All | All | All | All |
| Hardware | Netgear | D6100 | - | All | All | All |
| Hardware | Netgear | D6100 | - | All | All | All |
| Operating System | Netgear | D6100 Firmware | All | All | All | All |
| Operating System | Netgear | D6100 Firmware | All | All | All | All |
| Hardware | Netgear | R7500 | v2 | All | All | All |
| Hardware | Netgear | R7500 | v2 | All | All | All |
| Operating System | Netgear | R7500 Firmware | All | All | All | All |
| Operating System | Netgear | R7500 Firmware | All | All | All | All |
| Hardware | Netgear | R7800 | - | All | All | All |
| Hardware | Netgear | R7800 | - | All | All | All |
| Operating System | Netgear | R7800 Firmware | All | All | All | All |
| Operating System | Netgear | R7800 Firmware | All | All | All | All |
| Hardware | Netgear | R8900 | - | All | All | All |
| Hardware | Netgear | R8900 | - | All | All | All |
| Operating System | Netgear | R8900 Firmware | All | All | All | All |
| Operating System | Netgear | R8900 Firmware | All | All | All | All |
| Hardware | Netgear | R9000 | - | All | All | All |
| Hardware | Netgear | R9000 | - | All | All | All |
| Operating System | Netgear | R9000 Firmware | All | All | All | All |
| Operating System | Netgear | R9000 Firmware | All | All | All | All |
| Hardware | Netgear | Rbk20 | - | All | All | All |
| Hardware | Netgear | Rbk20 | - | All | All | All |
| Operating System | Netgear | Rbk20 Firmware | All | All | All | All |
| Operating System | Netgear | Rbk20 Firmware | All | All | All | All |
| Hardware | Netgear | Rbk50 | - | All | All | All |
| Hardware | Netgear | Rbk50 | - | All | All | All |
| Operating System | Netgear | Rbk50 Firmware | All | All | All | All |
| Operating System | Netgear | Rbk50 Firmware | All | All | All | All |
| Hardware | Netgear | Rbr20 | - | All | All | All |
| Hardware | Netgear | Rbr20 | - | All | All | All |
| Operating System | Netgear | Rbr20 Firmware | All | All | All | All |
| Operating System | Netgear | Rbr20 Firmware | All | All | All | All |
| Hardware | Netgear | Rbr50 | - | All | All | All |
| Hardware | Netgear | Rbr50 | - | All | All | All |
| Operating System | Netgear | Rbr50 Firmware | All | All | All | All |
| Operating System | Netgear | Rbr50 Firmware | All | All | All | All |
| Hardware | Netgear | Rbs20 | - | All | All | All |
| Hardware | Netgear | Rbs20 | - | All | All | All |
| Operating System | Netgear | Rbs20 Firmware | All | All | All | All |
| Operating System | Netgear | Rbs20 Firmware | All | All | All | All |
| Hardware | Netgear | Rbs40 | - | All | All | All |
| Hardware | Netgear | Rbs40 | - | All | All | All |
| Operating System | Netgear | Rbs40 Firmware | All | All | All | All |
| Operating System | Netgear | Rbs40 Firmware | All | All | All | All |
| Hardware | Netgear | Rbs50 | - | All | All | All |
| Hardware | Netgear | Rbs50 | - | All | All | All |
| Operating System | Netgear | Rbs50 Firmware | All | All | All | All |
| Operating System | Netgear | Rbs50 Firmware | All | All | All | All |
| Hardware | Netgear | Wndr3700 | v4 | All | All | All |
| Hardware | Netgear | Wndr3700 | v4 | All | All | All |
| Operating System | Netgear | Wndr3700 Firmware | All | All | All | All |
| Operating System | Netgear | Wndr3700 Firmware | All | All | All | All |
| Hardware | Netgear | Wndr4300 | v1 | All | All | All |
| Hardware | Netgear | Wndr4300 | v2 | All | All | All |
| Hardware | Netgear | Wndr4300 | v1 | All | All | All |
| Hardware | Netgear | Wndr4300 | v2 | All | All | All |
| Operating System | Netgear | Wndr4300 Firmware | All | All | All | All |
| Operating System | Netgear | Wndr4300 Firmware | All | All | All | All |
| Hardware | Netgear | Wndr4500 | v3 | All | All | All |
| Hardware | Netgear | Wndr4500 | v3 | All | All | All |
| Operating System | Netgear | Wndr4500 Firmware | All | All | All | All |
| Operating System | Netgear | Wndr4500 Firmware | All | All | All | All |
| Hardware | Netgear | Wnr2000 | v5 | All | All | All |
| Hardware | Netgear | Wnr2000 | v5 | All | All | All |
| Operating System | Netgear | Wnr2000 Firmware | All | All | All | All |
| Operating System | Netgear | Wnr2000 Firmware | All | All | All | All |
| Hardware | Netgear | Xr500 | - | All | All | All |
| Hardware | Netgear | Xr500 | - | All | All | All |
| Operating System | Netgear | Xr500 Firmware | All | All | All | All |
| Operating System | Netgear | Xr500 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Advisory for Post-Authentication Command Injection on Some Routers, Gateways, and WiFi Systems, PSV-2018-0144 | Answer | NETGEAR Support | CONFIRM | kb.netgear.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.