NETGEAR Multiple Model cgi-bin RCE

high Nessus Plugin ID 95823

Synopsis

The remote router is affected by a remote command execution vulnerability.

Description

The remote NETGEAR router is affected by a remote command execution vulnerability due to improper sanitization of user-supplied input passed via /cgi-bin/. An unauthenticated, remote attacker can exploit this, via a specially crafted URL, to execute arbitrary commands on the device.

Note that Nessus has detected this vulnerability by reading the contents of file /proc/cpuinfo.

Solution

Apply the latest available firmware update according to the vendor advisory.

See Also

https://kb.netgear.com/000036386/CVE-2016-582384

Plugin Details

Severity: High

ID: 95823

File Name: netgear_cmd_exec.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 12/14/2016

Updated: 4/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-6277

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/o:netgear:d6220_firmware, cpe:/o:netgear:d6400_firmware, cpe:/o:netgear:r6250_firmware, cpe:/o:netgear:r6400_firmware, cpe:/o:netgear:r6700_firmware, cpe:/o:netgear:r6900_firmware, cpe:/o:netgear:r7000_firmware, cpe:/o:netgear:r7100lg_firmware, cpe:/o:netgear:r7300dst_firmware, cpe:/o:netgear:r7900_firmware, cpe:/o:netgear:r8000_firmware

Required KB Items: installed_sw/Netgear WWW

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2/8/2017

Vulnerability Publication Date: 12/8/2016

CISA Known Exploited Vulnerability Due Dates: 9/7/2022

Exploitable With

Metasploit (Netgear R7000 and R6400 cgi-bin Command Injection)

Reference Information

CVE: CVE-2016-6277

CERT: 582384