CVE-2026-0404 (GCVE-0-2026-0404)
Vulnerability from cvelistv5
Published
2026-01-13 16:01
Modified
2026-02-26 15:04
CWE
  • CWE-20 - Improper Input Validation
Summary
An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allows network adjacent attackers authenticated over WiFi or on LAN to execute OS command injections on the router. DHCPv6 is not enabled by default.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0404",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T04:57:22.559440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T15:04:43.482Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RBRE960",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBSE960",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBR850",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBS850",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBR860",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBS860",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBRE950",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBSE950",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBR750",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBS750",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBR840",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "RBS840",
          "vendor": "NETGEAR",
          "versions": [
            {
              "lessThan": "v7.2.8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbre960:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbse960:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbr850:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbs850:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbr860:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbs860:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbre950:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbse950:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbr750:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbr840:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:h:netgear:rbs840:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "v7.2.8.5",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Hyunseok Yun"
        }
      ],
      "datePublic": "2026-01-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn insufficient input validation vulnerability in NETGEAR Orbi devices\u0027 \nDHCPv6 functionality\u0026nbsp;allows network adjacent attackers authenticated \nover\u0026nbsp;WiFi or on LAN\u0026nbsp;to execute OS command injections on the router. \nDHCPv6 is not enabled by default.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "An insufficient input validation vulnerability in NETGEAR Orbi devices\u0027 \nDHCPv6 functionality\u00a0allows network adjacent attackers authenticated \nover\u00a0WiFi or on LAN\u00a0to execute OS command injections on the router. \nDHCPv6 is not enabled by default."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NO",
            "Recovery": "USER",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "ADJACENT",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "UNREPORTED",
            "privilegesRequired": "LOW",
            "providerUrgency": "AMBER",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "DIFFUSE",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "MODERATE"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-13T16:22:30.971Z",
        "orgId": "a2826606-91e7-4eb6-899e-8484bd4575d5",
        "shortName": "NETGEAR"
      },
      "references": [
        {
          "tags": [
            "patch",
            "product"
          ],
          "url": "https://www.netgear.com/support/product/rbre960"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbse960"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbr850"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbs850"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbr860"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbs860"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbre950"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbse950"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbr750"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbs750"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbr840"
        },
        {
          "tags": [
            "product",
            "patch"
          ],
          "url": "https://www.netgear.com/support/product/rbs840"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eDevices with automatic updates enabled may already have this patch \napplied. If not, please check the firmware version and update it to the \nlatest.\u003c/p\u003e\n\n\u003cp\u003eFixed in:\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003eRBR750\u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbr750\"\u003e firmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR840 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbr840\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR850 \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.netgear.com/support/product/rbr850\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR860 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbr860\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS750 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbs750\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS840 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbs840\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS850 \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.netgear.com/support/product/rbs850\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS860 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbs860\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBRE950\u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbre950\"\u003e firmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBRE960 \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.netgear.com/support/product/rbre960\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBSE950 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbse950\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBSE960 \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.netgear.com/support/product/rbse960\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "Devices with automatic updates enabled may already have this patch \napplied. If not, please check the firmware version and update it to the \nlatest.\n\n\n\nFixed in:\n\n\n\n\n\nRBR750  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr750 \nRBR840  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr840 \nRBR850  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr850 \nRBR860  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr860 \nRBS750  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs750 \nRBS840  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs840 \nRBS850  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs850 \nRBS860  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs860 \nRBRE950  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbre950 \nRBRE960  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbre960 \nRBSE950  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbse950 \nRBSE960  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbse960"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Insufficient input validation in NETGEAR Orbi routers",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a2826606-91e7-4eb6-899e-8484bd4575d5",
    "assignerShortName": "NETGEAR",
    "cveId": "CVE-2026-0404",
    "datePublished": "2026-01-13T16:01:14.944Z",
    "dateReserved": "2025-12-03T04:16:10.186Z",
    "dateUpdated": "2026-02-26T15:04:43.482Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0404\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-13T16:24:39.262353Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-13T16:25:05.607Z\"}}], \"cna\": {\"title\": \"Insufficient input validation in NETGEAR Orbi routers\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Hyunseok Yun\"}], \"impacts\": [{\"capecId\": \"CAPEC-88\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-88 OS Command Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 4.8, \"Automatable\": \"NO\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"NETGEAR\", \"product\": \"RBRE960\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBSE960\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBR850\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS850\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBR860\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS860\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBRE950\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBSE950\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBR750\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS750\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBR840\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS840\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Devices with automatic updates enabled may already have this patch \\napplied. If not, please check the firmware version and update it to the \\nlatest.\\n\\n\\n\\nFixed in:\\n\\n\\n\\n\\n\\nRBR750  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr750 \\nRBR840  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr840 \\nRBR850  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr850 \\nRBR860  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbr860 \\nRBS750  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs750 \\nRBS840  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs840 \\nRBS850  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs850 \\nRBS860  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbs860 \\nRBRE950  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbre950 \\nRBRE960  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbre960 \\nRBSE950  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbse950 \\nRBSE960  firmware v7.2.8.5 or later https://www.netgear.com/support/product/rbse960\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eDevices with automatic updates enabled may already have this patch \\napplied. If not, please check the firmware version and update it to the \\nlatest.\u003c/p\u003e\\n\\n\u003cp\u003eFixed in:\u003c/p\u003e\\n\\n\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003eRBR750\u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbr750\\\"\u003e firmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR840 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbr840\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR850 \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.netgear.com/support/product/rbr850\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR860 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbr860\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS750 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbs750\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS840 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbs840\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS850 \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.netgear.com/support/product/rbs850\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS860 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbs860\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBRE950\u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbre950\\\"\u003e firmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBRE960 \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.netgear.com/support/product/rbre960\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBSE950 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbse950\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBSE960 \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.netgear.com/support/product/rbse960\\\"\u003efirmware v7.2.8.5 or later\u003c/a\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-01-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.netgear.com/support/product/rbre960\", \"tags\": [\"patch\", \"product\"]}, {\"url\": \"https://www.netgear.com/support/product/rbse960\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbr850\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs850\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbr860\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs860\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbre950\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbse950\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbr750\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs750\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbr840\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs840\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An insufficient input validation vulnerability in NETGEAR Orbi devices\u0027 \\nDHCPv6 functionality\\u00a0allows network adjacent attackers authenticated \\nover\\u00a0WiFi or on LAN\\u00a0to execute OS command injections on the router. \\nDHCPv6 is not enabled by default.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAn insufficient input validation vulnerability in NETGEAR Orbi devices\u0027 \\nDHCPv6 functionality\u0026nbsp;allows network adjacent attackers authenticated \\nover\u0026nbsp;WiFi or on LAN\u0026nbsp;to execute OS command injections on the router. \\nDHCPv6 is not enabled by default.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbre960:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbse960:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr850:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs850:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr860:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs860:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbre950:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbse950:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr750:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr840:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs840:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"a2826606-91e7-4eb6-899e-8484bd4575d5\", \"shortName\": \"NETGEAR\", \"dateUpdated\": \"2026-01-13T16:22:30.971Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-0404\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T04:57:21.815Z\", \"dateReserved\": \"2025-12-03T04:16:10.186Z\", \"assignerOrgId\": \"a2826606-91e7-4eb6-899e-8484bd4575d5\", \"datePublished\": \"2026-01-13T16:01:14.944Z\", \"assignerShortName\": \"NETGEAR\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…