ID

VAR-202004-1685


CVE

CVE-2018-21227


TITLE

plural NETGEAR Injection vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-016408

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.34, R6400v2 before 1.0.2.34, R6700 before 1.0.1.30, R6900 before 1.0.1.30, R6900P before 1.0.0.62, R7000 before 1.0.9.12, R7000P before 1.0.0.62, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6400, etc. are all products of NETGEAR. NETGEAR R6400 is a wireless router. NETGEAR R6700 is a wireless router. NETGEAR D7800 is a wireless modem. Injection vulnerabilities exist in many NETGEAR products. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided. This affects D7800 prior to 1.0.1.34, R6400v2 prior to 1.0.2.34, R6700 prior to 1.0.1.30, R6900 prior to 1.0.1.30, R6900P prior to 1.0.0.62, R7000 prior to 1.0.9.12, R7000P prior to 1.0.0.62, R7500v2 prior to 1.0.3.26, R7800 prior to 1.0.2.42, R9000 prior to 1.0.3.10, WNDR4300v2 prior to 1.0.0.50, and WNDR4500v3 prior to 1.0.0.50

Trust: 2.25

sources: NVD: CVE-2018-21227 // JVNDB: JVNDB-2018-016408 // CNVD: CNVD-2021-52962 // VULMON: CVE-2018-21227

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-52962

AFFECTED PRODUCTS

vendor:netgearmodel:d7800scope:ltversion:1.0.1.34

Trust: 1.6

vendor:netgearmodel:r7800scope:ltversion:1.0.2.42

Trust: 1.6

vendor:netgearmodel:r9000scope:ltversion:1.0.3.10

Trust: 1.6

vendor:netgearmodel:r6700scope:ltversion:1.0.1.30

Trust: 1.6

vendor:netgearmodel:r6900scope:ltversion:1.0.1.30

Trust: 1.6

vendor:netgearmodel:r7000scope:ltversion:1.0.9.12

Trust: 1.6

vendor:netgearmodel:r6900pscope:ltversion:1.0.0.62

Trust: 1.6

vendor:netgearmodel:r7000pscope:ltversion:1.0.0.62

Trust: 1.6

vendor:netgearmodel:r7500scope:ltversion:1.0.3.26

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.2.34

Trust: 1.0

vendor:netgearmodel:wndr4500scope:ltversion:1.0.0.50

Trust: 1.0

vendor:netgearmodel:wndr4300scope:ltversion:1.0.0.50

Trust: 1.0

vendor:netgearmodel:d7800scope:eqversion:1.0.1.34

Trust: 0.8

vendor:netgearmodel:r6400scope:eqversion:1.0.2.34

Trust: 0.8

vendor:netgearmodel:r6700scope:eqversion:1.0.1.30

Trust: 0.8

vendor:netgearmodel:r6900scope:eqversion:1.0.1.30

Trust: 0.8

vendor:netgearmodel:r6900pscope:eqversion:1.0.0.62

Trust: 0.8

vendor:netgearmodel:r7000scope:eqversion:1.0.9.12

Trust: 0.8

vendor:netgearmodel:r7000pscope:eqversion:1.0.0.62

Trust: 0.8

vendor:netgearmodel:r7500scope:eqversion:1.0.3.26

Trust: 0.8

vendor:netgearmodel:r7800scope:eqversion:1.0.2.42

Trust: 0.8

vendor:netgearmodel:r9000scope:eqversion:1.0.3.10

Trust: 0.8

vendor:netgearmodel:wndr4300v2scope:ltversion:1.0.0.50

Trust: 0.6

vendor:netgearmodel:wndr4500v3scope:ltversion:1.0.0.50

Trust: 0.6

vendor:netgearmodel:r7500v2scope:ltversion:1.0.3.26

Trust: 0.6

vendor:netgearmodel:r6400v2scope:ltversion:1.0.2.34

Trust: 0.6

vendor:netgearmodel:d7800scope:eqversion:1.0.1.22

Trust: 0.1

vendor:netgearmodel:d7800scope:eqversion:1.0.1.24

Trust: 0.1

vendor:netgearmodel:d7800scope:eqversion:1.0.1.28

Trust: 0.1

vendor:netgearmodel:d7800scope:eqversion:1.0.1.30

Trust: 0.1

vendor:netgearmodel:d7800scope:eqversion:1.0.1.31

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.12

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.14

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.18

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.20

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.24

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.32

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.36

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.42

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.1.44

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.2.18

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.2.30

Trust: 0.1

vendor:netgearmodel:r6400scope:eqversion:1.0.2.32

Trust: 0.1

vendor:netgearmodel:r6700scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r6700scope:eqversion:1.0.1.14

Trust: 0.1

vendor:netgearmodel:r6700scope:eqversion:1.0.1.16

Trust: 0.1

vendor:netgearmodel:r6700scope:eqversion:1.0.1.20

Trust: 0.1

vendor:netgearmodel:r6700scope:eqversion:1.0.1.22

Trust: 0.1

vendor:netgearmodel:r6700scope:eqversion:1.0.1.26

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion:1.0.1.14

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion:1.0.1.16

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion:1.0.1.20

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion:1.0.1.22

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion:1.0.1.26

Trust: 0.1

vendor:netgearmodel:r6900scope:eqversion:1.0.1.28

Trust: 0.1

vendor:netgearmodel:r6900pscope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r6900pscope:eqversion:1.0.0.56

Trust: 0.1

vendor:netgearmodel:r6900pscope:eqversion:1.0.0.58

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion:1.0.7.2 1.1.93

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion:1.0.7.10

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion:1.0.9.4

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion:1.0.9.6

Trust: 0.1

vendor:netgearmodel:r7000scope:eqversion:1.0.9.10

Trust: 0.1

vendor:netgearmodel:r7000pscope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r7000pscope:eqversion:1.0.0.56

Trust: 0.1

vendor:netgearmodel:r7000pscope:eqversion:1.0.0.58

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.108

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.110

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.112

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.116

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.118

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.122

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.124

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.0.130

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.3.10

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.3.16

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.3.20

Trust: 0.1

vendor:netgearmodel:r7500scope:eqversion:1.0.3.24

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.16

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.28

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.30

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.32

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.36

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.38

Trust: 0.1

vendor:netgearmodel:r7800scope:eqversion:1.0.2.40

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.2.4

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.2.30

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.2.40

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.2.52

Trust: 0.1

vendor:netgearmodel:r9000scope:eqversion:1.0.3.6

Trust: 0.1

vendor:netgearmodel:wndr4300scope:eqversion:1.0.0.48

Trust: 0.1

vendor:netgearmodel:wndr4500scope:eqversion: -

Trust: 0.1

vendor:netgearmodel:wndr4500scope:eqversion:1.0.0.48

Trust: 0.1

sources: CNVD: CNVD-2021-52962 // VULMON: CVE-2018-21227 // JVNDB: JVNDB-2018-016408 // NVD: CVE-2018-21227

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-21227
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2018-21227
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2018-016408
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-52962
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202004-2130
value: MEDIUM

Trust: 0.6

VULMON: CVE-2018-21227
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-21227
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2018-016408
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-52962
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-21227
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2018-21227
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2018-016408
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-52962 // VULMON: CVE-2018-21227 // JVNDB: JVNDB-2018-016408 // CNNVD: CNNVD-202004-2130 // NVD: CVE-2018-21227 // NVD: CVE-2018-21227

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.8

sources: JVNDB: JVNDB-2018-016408 // NVD: CVE-2018-21227

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202004-2130

TYPE

injection

Trust: 0.6

sources: CNNVD: CNNVD-202004-2130

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-016408

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some Routers and Gateways, PSV-2017-0737url:https://kb.netgear.com/000055109/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2017-0737

Trust: 0.8

title:Patch for Injection vulnerabilities in multiple NETGEAR products (CNVD-2021-52962)url:https://www.cnvd.org.cn/patchInfo/show/280091

Trust: 0.6

title:Multiple NETGEAR Product Command Injection Vulnerability Fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117053

Trust: 0.6

sources: CNVD: CNVD-2021-52962 // JVNDB: JVNDB-2018-016408 // CNNVD: CNNVD-202004-2130

EXTERNAL IDS

db:NVDid:CVE-2018-21227

Trust: 3.1

db:JVNDBid:JVNDB-2018-016408

Trust: 0.8

db:CNVDid:CNVD-2021-52962

Trust: 0.6

db:CNNVDid:CNNVD-202004-2130

Trust: 0.6

db:VULMONid:CVE-2018-21227

Trust: 0.1

sources: CNVD: CNVD-2021-52962 // VULMON: CVE-2018-21227 // JVNDB: JVNDB-2018-016408 // CNNVD: CNNVD-202004-2130 // NVD: CVE-2018-21227

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-21227

Trust: 2.0

url:https://kb.netgear.com/000055109/security-advisory-for-post-authentication-command-injection-on-some-routers-and-gateways-psv-2017-0737

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21227

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/74.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-52962 // VULMON: CVE-2018-21227 // JVNDB: JVNDB-2018-016408 // CNNVD: CNNVD-202004-2130 // NVD: CVE-2018-21227

SOURCES

db:CNVDid:CNVD-2021-52962
db:VULMONid:CVE-2018-21227
db:JVNDBid:JVNDB-2018-016408
db:CNNVDid:CNNVD-202004-2130
db:NVDid:CVE-2018-21227

LAST UPDATE DATE

2024-11-23T22:16:29.977000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-52962date:2021-07-21T00:00:00
db:VULMONid:CVE-2018-21227date:2020-05-01T00:00:00
db:JVNDBid:JVNDB-2018-016408date:2020-06-03T00:00:00
db:CNNVDid:CNNVD-202004-2130date:2020-05-07T00:00:00
db:NVDid:CVE-2018-21227date:2024-11-21T04:03:13.760

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-52962date:2020-07-21T00:00:00
db:VULMONid:CVE-2018-21227date:2020-04-24T00:00:00
db:JVNDBid:JVNDB-2018-016408date:2020-06-03T00:00:00
db:CNNVDid:CNNVD-202004-2130date:2020-04-24T00:00:00
db:NVDid:CVE-2018-21227date:2020-04-24T15:15:12.753