{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T23:30:46.443","vulnerabilities":[{"cve":{"id":"CVE-2022-40619","sourceIdentifier":"cve@mitre.org","published":"2026-01-28T19:16:18.893","lastModified":"2026-03-09T14:43:22.340","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26."},{"lang":"es","value":"FunJSQ, un módulo de terceros integrado en algunos routers NETGEAR y sistemas WiFi Orbi, expone un servidor HTTP a través de la interfaz LAN de los dispositivos afectados. Esta interfaz es vulnerable a la inyección de comandos arbitrarios no autenticada a través del parámetro funjsq_access_token. Esto afecta a los R6230 anteriores a 1.1.0.112, R6260 anteriores a 1.1.0.88, R7000 anteriores a 1.0.11.134, R8900 anteriores a 1.0.5.42, R9000 anteriores a 1.0.5.42, y XR300 anteriores a 1.0.3.72 y a los Orbi RBR20 anteriores a 2.7.2.26, RBR50 anteriores a 2.7.4.26, RBS20 anteriores a 2.7.2.26, y RBS50 anteriores a 2.7.4.26."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":5.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.2.26","matchCriteriaId":"BA89FD9D-321A-4AC0-BA34-99E1E44E9F6E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*","matchCriteriaId":"AE5DBD66-9C2A-4EFF-87AB-03E791D584B5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0.112","matchCriteriaId":"18AC4290-2157-47C6-822B-6D74AA1555D4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*","matchCriteriaId":"C91CADFA-59DB-4B6C-A914-848884F4A4BD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0.88","matchCriteriaId":"035DDBDE-4099-4740-B029-968CFC8F8A9A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*","matchCriteriaId":"3C395D49-57F9-4BC1-8619-57127355B86B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.11.134","matchCriteriaId":"5376DD03-0DDD-4B0C-A185-EC226515B32A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*","matchCriteriaId":"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.5.42","matchCriteriaId":"28E8F8CF-434B-4AA9-81B7-8814A6640DF5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*","matchCriteriaId":"0F859165-8D89-4CDD-9D48-9C7923D2261F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.5.42","matchCriteriaId":"CB2F24D5-B4E8-4C06-B6EC-8FF579A18755"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*","matchCriteriaId":"D74F1BFC-562E-4E7D-BBAB-2F8B593B5A57"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.8.40","matchCriteriaId":"E9462FE4-2215-4247-9F28-B2AB72B68E32"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*","matchCriteriaId":"1742BD56-84E4-40E1-8C04-098B3715161E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:rax120v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.8.40","matchCriteriaId":"A31C1203-2E92-40BF-AC9A-1344E531ACA2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:rax120v2:-:*:*:*:*:*:*:*","matchCriteriaId":"50D741E6-43F9-4BDC-B1A4-281AC73A7C19"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.72","matchCriteriaId":"004CA551-E868-447C-B853-3A13E5956C3B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*","matchCriteriaId":"5590CF28-B88A-4755-904B-1BC1778FBEDD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.2.26","matchCriteriaId":"DB4593AB-3CBD-4C18-AC19-0A7F60FB4AE4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*","matchCriteriaId":"14FC7F5B-7E4F-4A68-8427-D1F553EBE8CA"}]}]}],"references":[{"url":"https://kb.netgear.com/000065132/Security-Advisory-for-Vulnerabilities-in-FunJSQ-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2022-0117","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.onekey.com/resource/security-advisory-netgear-routers-funjsq-vulnerabilities","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}