CVE-2016-6277
critical-risk
Published 2016-12-14
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
Do I need to act?
!
94.3% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (11)
Affected Vendors
References (17)
Broken Link
http://www.securityfocus.com/bid/94819
Third Party Advisory
https://www.exploit-db.com/exploits/40889/
Third Party Advisory
https://www.kb.cert.org/vuls/id/582384
Broken Link
http://www.securityfocus.com/bid/94819
Third Party Advisory
https://www.exploit-db.com/exploits/40889/
Third Party Advisory
https://www.kb.cert.org/vuls/id/582384
80
/ 100
critical-risk
Severity
30/34 · Critical
Exploitability
34/34 · Critical
Exposure
16/34 · Moderate