CVE-2022-36429
CVSS V2 None
CVSS V3 None
Description
A command execution vulnerability exists in the ubus backend communications functionality of Netgear Orbi Satellite RBS750 4.6.8.5. A specially-crafted JSON object can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.
Overview
- CVE ID
- CVE-2022-36429
- Assigner
- talos-cna@cisco.com
- Vulnerability Status
- Modified
- Published Version
- 2023-03-21T18:15:11
- Last Modified Date
- 2023-03-29T11:15:06
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:netgear:rbs750_firmware:4.6.8.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://kb.netgear.com/000065424/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0188 | |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597 | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-36429 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36429 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:03:56 | Added to TrackCVE | |||
2023-04-17 03:03:58 | Weakness Enumeration | new |