Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameters.
References
Link | Resource |
---|---|
https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler | Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler | Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler - Third Party Advisory | |
References | () https://www.netgear.com/about/security/ - Vendor Advisory |
Information
Published : 2023-08-07 19:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38921
Mitre link : CVE-2023-38921
CVE.ORG link : CVE-2023-38921
JSON object : View
Products Affected
netgear
- wg302v2
- wag302v2_firmware
- wg302v2_firmware
- wag302v2
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')