CVE-2026-0404
Unknown Unknown - Not Provided
OS Command Injection in NETGEAR Orbi DHCPv6 via Insufficient Validation

Publication date: 2026-01-13

Last updated on: 2026-02-12

Assigner: Netgear, Inc.

Description
An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allows network adjacent attackers authenticated over WiFi or on LAN to execute OS command injections on the router. DHCPv6 is not enabled by default.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-02-12
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 12 associated CPEs
Vendor Product Version / Range
netgear rbr750_firmware to 7.2.8.5 (exc)
netgear rbr840_firmware to 7.2.8.5 (exc)
netgear rbr850_firmware to 7.2.8.5 (exc)
netgear rbr860_firmware to 7.2.8.5 (exc)
netgear rbs750_firmware to 7.2.8.5 (exc)
netgear rbs840_firmware to 7.2.8.5 (exc)
netgear rbs850_firmware to 7.2.8.5 (exc)
netgear rbs860_firmware to 7.2.8.5 (exc)
netgear rbre950_firmware to 7.2.8.5 (exc)
netgear rbre960_firmware to 7.2.8.5 (exc)
netgear rbse950_firmware to 7.2.8.5 (exc)
netgear rbse960_firmware to 7.2.8.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an insufficient input validation flaw in the DHCPv6 functionality of NETGEAR Orbi devices. It allows attackers who are network adjacent and authenticated over WiFi or on the LAN to execute operating system command injections on the router. DHCPv6 is not enabled by default on these devices.


How can this vulnerability impact me? :

An attacker who is authenticated on the local network or WiFi can exploit this vulnerability to execute OS command injections on the router. This could potentially allow the attacker to take control of the router, disrupt network operations, or compromise network security.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that your NETGEAR Orbi devices have the latest firmware updates installed. If your devices have automatic updates enabled, they may already be patched. Otherwise, manually verify your firmware version and update to the fixed versions or later as listed in the advisory. Prompt application of these updates is important to prevent exploitation. [7]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart