ID

VAR-202410-1222


CVE

CVE-2024-35519


TITLE

Command injection vulnerability in multiple Netgear products

Trust: 0.8

sources: JVNDB: JVNDB-2024-010366

DESCRIPTION

Netgear EX6120 v1.0.0.68, Netgear EX6100 v1.0.2.28, and Netgear EX3700 v1.0.0.96 are vulnerable to command injection in operating_mode.cgi via the ap_mode parameter. of netgear EX3700 firmware, EX6100 firmware, EX6120 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-35519 // JVNDB: JVNDB-2024-010366

AFFECTED PRODUCTS

vendor:netgearmodel:ex3700scope:lteversion:1.0.0.96

Trust: 1.0

vendor:netgearmodel:ex6120scope:lteversion:1.0.0.68

Trust: 1.0

vendor:netgearmodel:ex6100scope:lteversion:1.0.2.28

Trust: 1.0

vendor:ネットギアmodel:ex3700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6120scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6100scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2024-010366 // NVD: CVE-2024-35519

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-35519
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2024-35519
value: HIGH

Trust: 1.0

NVD: CVE-2024-35519
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2024-35519
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2024-35519
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2024-35519
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-010366 // NVD: CVE-2024-35519 // NVD: CVE-2024-35519

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-010366 // NVD: CVE-2024-35519

EXTERNAL IDS

db:NVDid:CVE-2024-35519

Trust: 2.6

db:JVNDBid:JVNDB-2024-010366

Trust: 0.8

sources: JVNDB: JVNDB-2024-010366 // NVD: CVE-2024-35519

REFERENCES

url:https://github.com/consrc/cves/blob/main/cve-2024-35519.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-35519

Trust: 0.8

sources: JVNDB: JVNDB-2024-010366 // NVD: CVE-2024-35519

SOURCES

db:JVNDBid:JVNDB-2024-010366
db:NVDid:CVE-2024-35519

LAST UPDATE DATE

2024-10-18T03:51:38.999000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-010366date:2024-10-17T00:48:00
db:NVDid:CVE-2024-35519date:2024-10-16T17:17:57.140

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-010366date:2024-10-17T00:00:00
db:NVDid:CVE-2024-35519date:2024-10-14T22:15:03.543