CVE-2026-0403 (GCVE-0-2026-0403)
Vulnerability from cvelistv5 – Published: 2026-01-13 16:00 – Updated: 2026-01-14 04:57
VLAI?
Title
Insufficient input validation in NETGEAR Orbi routers
Summary
An insufficient input validation vulnerability in NETGEAR Orbi routers
allows attackers connected to the router's LAN to execute OS command
injections.
Severity ?
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| NETGEAR | RBR750 |
Affected:
0 , ≤ 4.6.14.3
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Credits
fxc233
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0403",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-13T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-14T04:57:19.762Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RBR750",
"vendor": "NETGEAR",
"versions": [
{
"lessThanOrEqual": "4.6.14.3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBS750",
"vendor": "NETGEAR",
"versions": [
{
"lessThanOrEqual": "4.6.14.3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBRE960",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "v7.2.7.15",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBSE960",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "v7.2.7.15",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBR850",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "V7.2.8.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBS850",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "V7.2.8.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBE971",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "v9.10.0.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBE970",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "v9.10.0.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBR860",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "v7.2.8.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBS860",
"vendor": "NETGEAR",
"versions": [
{
"lessThan": "v7.2.8.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbr750:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.6.14.3",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.6.14.3",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbre960:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v7.2.7.15",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbse960:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v7.2.7.15",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbr850:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v7.2.8.5",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbs850:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v7.2.8.5",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbe971:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v9.10.0.2",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbe970:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v9.10.0.2",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbr860:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v7.2.8.5",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netgear:rbs860:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v7.2.8.5",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "fxc233"
}
],
"datePublic": "2026-01-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn insufficient input validation vulnerability in NETGEAR Orbi routers \nallows attackers connected to the router\u0027s LAN\u0026nbsp;to execute OS command \ninjections.\u0026nbsp;\u003c/p\u003e"
}
],
"value": "An insufficient input validation vulnerability in NETGEAR Orbi routers \nallows attackers connected to the router\u0027s LAN\u00a0to execute OS command \ninjections."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"baseScore": 1.1,
"baseSeverity": "LOW",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "HIGH",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-13T16:20:30.263Z",
"orgId": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"shortName": "NETGEAR"
},
"references": [
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbr750"
},
{
"tags": [
"patch",
"product"
],
"url": "https://www.netgear.com/support/product/rbs750"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbre960"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbse960"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbr850"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbs850"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbe971"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbe970"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbr860"
},
{
"tags": [
"product",
"patch"
],
"url": "https://www.netgear.com/support/product/rbs860"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDevices with automatic updates enabled may already have this\npatch applied. If not, please check the firmware version and update it to the\nlatest.\u003c/p\u003e\n\n\u003cp\u003eFixed in:\u003c/p\u003e\u003cp\u003e\u003cspan\u003eRBE971 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbe971\"\u003efirmware 9.10.0.2 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBE970 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbe970\"\u003efirmware 9.10.0.2 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR750\u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbr750\"\u003e firmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR850 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbr850\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR860 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbr860\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS750\u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbs750\"\u003e firmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS850 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbs850\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS860 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbs860\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBRE960 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbre960\"\u003efirmware 7.2.7.15 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBSE960 \u003c/span\u003e\u003ca href=\"https://www.netgear.com/support/product/rbse960\"\u003efirmware 7.2.7.15 or later\u003c/a\u003e\u003c/p\u003e"
}
],
"value": "Devices with automatic updates enabled may already have this\npatch applied. If not, please check the firmware version and update it to the\nlatest.\n\n\n\nFixed in:\n\nRBE971 firmware 9.10.0.2 or later https://www.netgear.com/support/product/rbe971 \nRBE970 firmware 9.10.0.2 or later https://www.netgear.com/support/product/rbe970 \nRBR750 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr750 \nRBR850 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr850 \nRBR860 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr860 \nRBS750 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs750 \nRBS850 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs850 \nRBS860 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs860 \nRBRE960 firmware 7.2.7.15 or later https://www.netgear.com/support/product/rbre960 \nRBSE960 firmware 7.2.7.15 or later https://www.netgear.com/support/product/rbse960"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Insufficient input validation in NETGEAR Orbi routers",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "a2826606-91e7-4eb6-899e-8484bd4575d5",
"assignerShortName": "NETGEAR",
"cveId": "CVE-2026-0403",
"datePublished": "2026-01-13T16:00:25.831Z",
"dateReserved": "2025-12-03T04:16:02.333Z",
"dateUpdated": "2026-01-14T04:57:19.762Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-0403\",\"sourceIdentifier\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\",\"published\":\"2026-01-13T16:16:10.150\",\"lastModified\":\"2026-01-14T16:26:00.933\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An insufficient input validation vulnerability in NETGEAR Orbi routers \\nallows attackers connected to the router\u0027s LAN\u00a0to execute OS command \\ninjections.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber\",\"baseScore\":1.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"references\":[{\"url\":\"https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbe970\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbe971\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbr750\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbr850\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbr860\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbre960\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbs750\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbs850\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbs860\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"},{\"url\":\"https://www.netgear.com/support/product/rbse960\",\"source\":\"a2826606-91e7-4eb6-899e-8484bd4575d5\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0403\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-13T19:08:14.570926Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-13T19:08:24.923Z\"}}], \"cna\": {\"title\": \"Insufficient input validation in NETGEAR Orbi routers\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"fxc233\"}], \"impacts\": [{\"capecId\": \"CAPEC-88\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-88 OS Command Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 1.1, \"Automatable\": \"NO\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"LOW\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"NETGEAR\", \"product\": \"RBR750\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.6.14.3\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS750\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.6.14.3\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBRE960\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.7.15\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBSE960\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.7.15\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBR850\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS850\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBE971\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v9.10.0.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBE970\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v9.10.0.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBR860\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NETGEAR\", \"product\": \"RBS860\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v7.2.8.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Devices with automatic updates enabled may already have this\\npatch applied. If not, please check the firmware version and update it to the\\nlatest.\\n\\n\\n\\nFixed in:\\n\\nRBE971 firmware 9.10.0.2 or later https://www.netgear.com/support/product/rbe971 \\nRBE970 firmware 9.10.0.2 or later https://www.netgear.com/support/product/rbe970 \\nRBR750 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr750 \\nRBR850 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr850 \\nRBR860 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr860 \\nRBS750 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs750 \\nRBS850 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs850 \\nRBS860 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs860 \\nRBRE960 firmware 7.2.7.15 or later https://www.netgear.com/support/product/rbre960 \\nRBSE960 firmware 7.2.7.15 or later https://www.netgear.com/support/product/rbse960\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eDevices with automatic updates enabled may already have this\\npatch applied. If not, please check the firmware version and update it to the\\nlatest.\u003c/p\u003e\\n\\n\u003cp\u003eFixed in:\u003c/p\u003e\u003cp\u003e\u003cspan\u003eRBE971 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbe971\\\"\u003efirmware 9.10.0.2 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBE970 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbe970\\\"\u003efirmware 9.10.0.2 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR750\u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbr750\\\"\u003e firmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR850 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbr850\\\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBR860 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbr860\\\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS750\u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbs750\\\"\u003e firmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS850 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbs850\\\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBS860 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbs860\\\"\u003efirmware 7.2.8.5 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBRE960 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbre960\\\"\u003efirmware 7.2.7.15 or later\u003c/a\u003e\u003cbr\u003e\u003cspan\u003eRBSE960 \u003c/span\u003e\u003ca href=\\\"https://www.netgear.com/support/product/rbse960\\\"\u003efirmware 7.2.7.15 or later\u003c/a\u003e\u003c/p\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-01-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.netgear.com/support/product/rbr750\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs750\", \"tags\": [\"patch\", \"product\"]}, {\"url\": \"https://www.netgear.com/support/product/rbre960\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbse960\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbr850\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs850\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbe971\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbe970\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbr860\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://www.netgear.com/support/product/rbs860\", \"tags\": [\"product\", \"patch\"]}, {\"url\": \"https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An insufficient input validation vulnerability in NETGEAR Orbi routers \\nallows attackers connected to the router\u0027s LAN\\u00a0to execute OS command \\ninjections.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAn insufficient input validation vulnerability in NETGEAR Orbi routers \\nallows attackers connected to the router\u0027s LAN\u0026nbsp;to execute OS command \\ninjections.\u0026nbsp;\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr750:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"4.6.14.3\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"4.6.14.3\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbre960:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.7.15\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbse960:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.7.15\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr850:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs850:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbe971:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v9.10.0.2\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbe970:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v9.10.0.2\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbr860:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:h:netgear:rbs860:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"v7.2.8.5\", \"versionStartIncluding\": \"0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"a2826606-91e7-4eb6-899e-8484bd4575d5\", \"shortName\": \"NETGEAR\", \"dateUpdated\": \"2026-01-13T16:20:30.263Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-0403\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T04:57:19.762Z\", \"dateReserved\": \"2025-12-03T04:16:02.333Z\", \"assignerOrgId\": \"a2826606-91e7-4eb6-899e-8484bd4575d5\", \"datePublished\": \"2026-01-13T16:00:25.831Z\", \"assignerShortName\": \"NETGEAR\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…