CVE-2025-45493
Command Injection in Netgear EX8000 iface Parameter
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| netgear | ex8000 | 1.0.0.126 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Command Injection in the Netgear EX8000 device, specifically in version V1.0.0.126. It occurs via the iface parameter in the action_bandwidth function, allowing an attacker to execute arbitrary commands on the device. [1]
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could execute arbitrary commands on the affected Netgear EX8000 device, potentially leading to unauthorized control, data compromise, disruption of network services, or further attacks within the network. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves testing for command injection via the iface parameter in the action_bandwidth function on Netgear EX8000 devices. While no explicit commands are provided, one approach is to send crafted HTTP requests targeting the action_bandwidth function with payloads in the iface parameter to observe if command injection occurs. Monitoring network traffic for unusual commands or responses related to this parameter may also help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable Netgear EX8000 device interfaces, especially the action_bandwidth function, applying any available firmware updates or patches from Netgear, and monitoring for suspicious activity related to the iface parameter. If no patches are available, consider disabling or limiting the functionality that processes the iface parameter to prevent exploitation. [1]