Command injection vulnerability was discovered in Netgear R6200 v2 firmware through R6200v2-V1.0.3.12 via binary /sbin/acos_service that could allow remote authenticated attackers the ability to modify values in the vulnerable parameter.
References
| Link | Resource |
|---|---|
| http://netgear.com | Product |
| http://r6200v2.com | Broken Link URL Repurposed |
| https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30079/CVE-2022-30079.md | Exploit Third Party Advisory |
| https://www.netgear.com/about/security/ | Vendor Advisory |
| http://netgear.com | Product |
| http://r6200v2.com | Broken Link URL Repurposed |
| https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30079/CVE-2022-30079.md | Exploit Third Party Advisory |
| https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2022-09-08 12:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30079
Mitre link : CVE-2022-30079
CVE.ORG link : CVE-2022-30079
JSON object : View
Products Affected
netgear
- r6200
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
