Vulnerability identifier: #VU74012
Vulnerability risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-912
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
RBR750
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBR840
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBR850
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBR860
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBRE950
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBRE960
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBS750
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBS840
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBS850
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBS860
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBSE950
Hardware solutions /
Routers & switches, VoIP, GSM, etc
RBSE960
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor:
Description
The vulnerability allows a remote user to compromise vulnerable system
The vulnerability exists due to hidden functionality (backdoor) is present in software within the hidden telnet service functionality. A remote administrator can use this functionality to gain full access to the application and execute arbitrary commands on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://talosintelligence.com/vulnerability_reports/TALOS-2022-1595
http://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.