{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T06:35:05.813","vulnerabilities":[{"cve":{"id":"CVE-2017-18794","sourceIdentifier":"cve@mitre.org","published":"2020-04-21T19:15:12.097","lastModified":"2024-11-21T03:20:56.440","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by command injection. This affects R6300v2 before 1.0.4.8_10.0.77, R6400 before 1.0.1.24, R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, R8500 before 1.0.2.100, and D6100 before 1.0.0.50_0.0.50."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por una inyección de comando. Esto afecta a R6300v2 versiones anteriores a la versión 1.0.4.8_10.0.77, R6400 versiones anteriores a la versión  1.0.1.24, R6700 versiones anteriores a 1.0.1.26, R7000 versiones anteriores a 1.0.9.10, R7100LG versiones anteriores a 1.0.0.32, R7900 versiones anteriores a 1.0.1.18, R8000 versiones anteriores a 1.0.3.54, R8500 versiones anteriores a 1.0.2.100, y D6100 versiones anteriores a 1.0.0.50_0.0.50."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV30":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.8_10.0.77","matchCriteriaId":"61FD5738-E14A-4CD2-A750-E75AFFE31119"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*","matchCriteriaId":"10938043-F7DF-42C3-8C16-F92CAF8E5576"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.24","matchCriteriaId":"29EA60BF-FBA6-4305-8173-07130A527410"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*","matchCriteriaId":"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.26","matchCriteriaId":"DC332E60-A7DB-41C5-B1ED-FE3EDF83F8BC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*","matchCriteriaId":"21B27F11-4262-4CE1-8107-B365A7C152F2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.9.10","matchCriteriaId":"DD7D570E-C5EF-4D3E-BCCF-926DBDB12016"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*","matchCriteriaId":"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.32","matchCriteriaId":"833A98AF-A4B0-4C68-AACD-6B3F58E64060"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*","matchCriteriaId":"366FA778-3C2A-42AF-9141-DAD7043B406C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.18","matchCriteriaId":"A98DFA81-D1BA-41AE-A6A3-1EBBFC452D0F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*","matchCriteriaId":"C484840F-AF30-4B5C-821A-4DB9BE407BDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.54","matchCriteriaId":"4BE5F241-45D7-42A2-B5EA-3869B1C97098"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*","matchCriteriaId":"5B39F095-8FE8-43FD-A866-7B613B495984"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.100","matchCriteriaId":"CEE4B878-05AB-4B45-BCA4-28795AA454F9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*","matchCriteriaId":"63500DE4-BDBD-4F86-AB99-7DB084D0B912"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.50_0.0.50","matchCriteriaId":"372D9D60-D9CB-4945-8B0B-760EBED9377C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*","matchCriteriaId":"7EFD1E86-F100-4E46-935D-903EB6FEFE9D"}]}]}],"references":[{"url":"https://kb.netgear.com/000049368/Security-Advisory-for-Command-Injection-Vulnerability-on-D6100-and-Some-Routers-PSV-2017-0321","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://kb.netgear.com/000049368/Security-Advisory-for-Command-Injection-Vulnerability-on-D6100-and-Some-Routers-PSV-2017-0321","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}