Vulnerability Name: CVE-2017-18773 (CCN-180647) Assigned: 2017-10-27 Published: 2017-10-27 Updated: 2020-04-24 Summary: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6100 before V1.0.0.55, D7800 before V1.0.1.24, EX6150v2 before 1.0.0.48, R6100 before 1.0.1.14, R7500 before 1.0.0.110, R7500v2 before V1.0.3.16, R7800 before V1.0.2.36, WNDR4300v1 before 1.0.2.90, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, and WNR2000v5 before 1.0.0.48. CVSS v3 Severity: 6.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H )5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): HighUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
6.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H )5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): HighUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-74 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2017-18773 Source: XF Type: UNKNOWNnetgear-cve201718773-cmd-exec(180647) Source: CCN Type: NETGEAR Security Advisory: PSV-2017-2184Security Advisory for Post Authentication Command Injection on Some Routers, Gateways, and Extenders Source: CONFIRM Type: Vendor Advisoryhttps://kb.netgear.com/000049556/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2184 Vulnerable Configuration: Configuration 1 :cpe:/o:netgear:d6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.55)AND cpe:/h:netgear:d6100:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:netgear:d7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.24)AND cpe:/h:netgear:d7800:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:netgear:ex6150_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.48)AND cpe:/h:netgear:ex6150:v2:*:*:*:*:*:*:* Configuration 4 :cpe:/o:netgear:r6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.14)AND cpe:/h:netgear:r6100:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:netgear:r7500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.110)AND cpe:/h:netgear:r7500:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:netgear:r7500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.16)AND cpe:/h:netgear:r7500:v2:*:*:*:*:*:*:* Configuration 7 :cpe:/o:netgear:r7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.36)AND cpe:/h:netgear:r7800:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.90)AND cpe:/h:netgear:wndr4300:v1:*:*:*:*:*:*:* Configuration 9 :cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.48)AND cpe:/h:netgear:wndr4300:v2:*:*:*:*:*:*:* Configuration 10 :cpe:/o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.48)AND cpe:/h:netgear:wndr4500:v3:*:*:*:*:*:*:* Configuration 11 :cpe:/o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.48)AND cpe:/h:netgear:wnr2000:v5:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:netgear:r7800_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:r7500v2_firmware:1.0.3:*:*:*:*:*:*:* OR cpe:/o:netgear:d7800_firmware:1.0.1:*:*:*:*:*:*:* OR cpe:/o:netgear:d6100_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4300v2_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wnr2000v5_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4500v3_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4300v1_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:r6100_firmware:1.0.1:*:*:*:*:*:*:* OR cpe:/o:netgear:r7500_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:ex6150v2_firmware:1.0.0:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
netgear d6100 firmware *
netgear d6100 -
netgear d7800 firmware *
netgear d7800 -
netgear ex6150 firmware *
netgear ex6150 v2
netgear r6100 firmware *
netgear r6100 -
netgear r7500 firmware *
netgear r7500 -
netgear r7500 firmware *
netgear r7500 v2
netgear r7800 firmware *
netgear r7800 -
netgear wndr4300 firmware *
netgear wndr4300 v1
netgear wndr4300 firmware *
netgear wndr4300 v2
netgear wndr4500 firmware *
netgear wndr4500 v3
netgear wnr2000 firmware *
netgear wnr2000 v5
netgear r7800 firmware 1.0.2
netgear r7500v2 firmware 1.0.3
netgear d7800 firmware 1.0.1
netgear d6100 firmware 1.0.0
netgear wndr4300v2 firmware 1.0.0
netgear wnr2000v5 firmware 1.0.0
netgear wndr4500v3 firmware 1.0.0
netgear wndr4300v1 firmware 1.0.2
netgear r6100 firmware 1.0.1
netgear r7500 firmware 1.0.0
netgear ex6150v2 firmware 1.0.0