Vulnerability Description
NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | R8500 Firmware | 1.0.2.158 |
| Netgear | R8500 | - |
Related Weaknesses (CWE)
References
- https://github.com/donothingme/VUL/blob/main/vul1/1.mdExploitPatchThird Party Advisory
- https://github.com/donothingme/VUL/blob/main/vul1/1.mdExploitPatchThird Party Advisory
FAQ
What is CVE-2022-27947?
CVE-2022-27947 is a vulnerability with a CVSS score of 8.8 (HIGH). NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan...
How severe is CVE-2022-27947?
CVE-2022-27947 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-27947?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear R8500 Firmware, Netgear R8500.