U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-6277

Change History

Modified Analysis by NIST 7/16/2024 1:43:59 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Removed CVSS V3
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

								
						
Changed CPE Configuration
AND
     OR
          *cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.22
          *cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.56
          *cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.4.6_10.1.12
          *cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.18
          *cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.14
          *cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.14
          *cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.7.2_1.1.93
          *cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.28
          *cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.46
          *cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.8
          *cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.3.26
     OR
          cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.22
     OR
          cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.56
     OR
          cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.4.6_10.1.12
     OR
          cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.18
     OR
          cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.14
     OR
          cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.14
     OR
          cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.7.2_1.1.93
     OR
          cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.28
     OR
          cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.0.46
     OR
          cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.1.8
     OR
          cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.0.3.26
     OR
          cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*
Changed Reference Type
http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html No Types Assigned
http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/94819 No Types Assigned
http://www.securityfocus.com/bid/94819 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ Mitigation, Third Party Advisory
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ Broken Link, Mitigation, Third Party Advisory
Changed Reference Type
https://kalypto.org/research/netgear-vulnerability-expanded/ Exploit, Third Party Advisory
https://kalypto.org/research/netgear-vulnerability-expanded/ Broken Link, Exploit, Third Party Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/40889/ Exploit, Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/40889/ Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/41598/ No Types Assigned
https://www.exploit-db.com/exploits/41598/ Exploit, Third Party Advisory, VDB Entry