We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in Netgear WG302v2 up to 5.2.9 and classified as critical. Affected by this issue is the function ui_get_input_value. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Eine Schwachstelle wurde in Netgear WG302v2 bis 5.2.9 gefunden. Sie wurde als kritisch eingestuft. Es geht hierbei um die Funktion ui_get_input_value. Dank Manipulation des Arguments host mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden.
2025-04-30: | Advisory disclosed |
2025-04-30: | VulDB entry created |
2025-04-30: | VulDB entry last update |
54357 (VulDB User)
vuldb.com/?id.306626 (VDB-306626 | Netgear WG302v2 ui_get_input_value command injection)
vuldb.com/?ctiid.306626 (VDB-306626 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.560779 (Submit #560779 | Netgear WG302v2 5.2.9 Command Injection)
github.com/...ic_settings_handler-static-ip-update/README.md
www.netgear.com/
Support options