Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:nighthawk_ax1800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B99D0FE-39ED-4211-9E9A-7D2E691E1BFC", "versionEndExcluding": "1.0.9.90", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:nighthawk_ax1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DE3A065-960D-4C5C-94BC-213136A7F346", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:nighthawk_ax2400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB05778B-B483-410D-B840-C3BBCABDDF21", "versionEndExcluding": "1.0.9.90", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:nighthawk_ax2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "268E1ED5-73FA-47D5-9E1E-7A7DDA6D2B67", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:nighthawk_ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A82842-679A-4BE5-80DA-F765C9574CA9", "versionEndExcluding": "1.0.9.90", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:nighthawk_ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E72EBF68-B0C1-4870-A53D-3BA183337706", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:nighthawk_ax5400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "361AFE8C-CAA7-49EB-8D3E-6E40340CB9FC", "versionEndExcluding": "1.0.9.90", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:nighthawk_ax5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE92943-95C9-4B04-AD1F-656BEB6ED20E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:nighthawk_ax6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F80E127F-1374-4781-B4D6-720F4F48D8D4", "versionEndExcluding": "1.0.9.90", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:nighthawk_ax6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "18BDA466-4A39-4D20-A82A-FE3D2770F4FA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:nighthawk_ax11000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E19D5AB-C995-4155-8049-775BC8CF9051", "versionEndExcluding": "1.0.9.90", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:nighthawk_ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F7CDAB-F102-4B24-9561-592C36708F1D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The \u201cpuhttpsniff\u201d service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication."}, {"lang": "es", "value": "El servicio ?puhttpsniff?, que se ejecuta de forma predeterminada, es susceptible a la inyecci\u00f3n de comandos debido a una entrada de usuario mal sanitizada. Un atacante no autenticado en el mismo segmento de red que el router puede ejecutar comandos arbitrarios en el dispositivo sin autenticaci\u00f3n."}], "id": "CVE-2022-47208", "lastModified": "2025-04-17T18:15:45.287", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}, "published": "2022-12-16T20:15:08.860", "references": [{"source": "vulnreport@tenable.com", "tags": ["Vendor Advisory"], "url": "https://www.tenable.com/security/research/tra-2022-37"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.tenable.com/security/research/tra-2022-37"}], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}, {"description": [{"lang": "en", "value": "CWE-78"}], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}