![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.106463 |
Category: | Web application abuses |
Title: | NETGEAR Routers RCE Vulnerability (CVE-2016-6277) - Active Check |
Summary: | Multiple Netgear routers are prone to a remote command execution; (RCE) vulnerability. |
Description: | Summary: Multiple Netgear routers are prone to a remote command execution (RCE) vulnerability. Vulnerability Impact: An unauthenticated user can inject os commands. Affected Software/OS: Netgear Model R6250, R6400, R6700, R6900, R7000, R7100LG, R7300DST, R7900, R8000, D6220 and D6400. Solution: Update to the latest firmware according the vendor's advisory. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6277 BugTraq ID: 94819 http://www.securityfocus.com/bid/94819 CERT/CC vulnerability note: VU#582384 https://www.kb.cert.org/vuls/id/582384 https://www.exploit-db.com/exploits/40889/ https://www.exploit-db.com/exploits/41598/ http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ https://kalypto.org/research/netgear-vulnerability-expanded/ |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |