Vulnerability Description
Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameters.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Wg302V2 Firmware | 5.2.9 |
| Netgear | Wg302V2 | - |
| Netgear | Wag302V2 Firmware | 5.1.19 |
| Netgear | Wag302V2 | - |
Related Weaknesses (CWE)
References
- https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handlerThird Party Advisory
- https://www.netgear.com/about/security/Vendor Advisory
- https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handlerThird Party Advisory
- https://www.netgear.com/about/security/Vendor Advisory
FAQ
What is CVE-2023-38921?
CVE-2023-38921 is a vulnerability with a CVSS score of 8.8 (HIGH). Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameter...
How severe is CVE-2023-38921?
CVE-2023-38921 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38921?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Wg302V2 Firmware, Netgear Wg302V2, Netgear Wag302V2 Firmware, Netgear Wag302V2.