Lucene search

K
cve[email protected]CVE-2022-36429
HistoryMar 21, 2023 - 6:15 p.m.

CVE-2022-36429

2023-03-2118:15:11
CWE-912
web.nvd.nist.gov
20
cve-2022-36429
netgear
orbi
satellite
rbs750
command execution
vulnerability
ubus backend
json
nvd

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.5%

A command execution vulnerability exists in the ubus backend communications functionality of Netgear Orbi Satellite RBS750 4.6.8.5. A specially-crafted JSON object can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
netgearrbs750Range4.6.8.5
VendorProductVersionCPE
netgearrbs750*cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Netgear",
    "product": "Orbi Satellite RBS750",
    "versions": [
      {
        "version": "4.6.8.5",
        "status": "affected"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.5%

Related for CVE-2022-36429