Description
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26.
Published: 2026-01-28
Score: 7.7 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgear r6230 Firmware
Netgear r6260 Firmware
Netgear r7000 Firmware
Netgear r8900 Firmware
Netgear r9000 Firmware
Netgear rax120
Netgear rax120 Firmware
Netgear rax120v2
Netgear rax120v2 Firmware
Netgear rbr20 Firmware
Netgear rbs20 Firmware
Netgear xr300 Firmware
CPEs cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax120v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax120v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear r6230 Firmware
Netgear r6260 Firmware
Netgear r7000 Firmware
Netgear r8900 Firmware
Netgear r9000 Firmware
Netgear rax120
Netgear rax120 Firmware
Netgear rax120v2
Netgear rax120v2 Firmware
Netgear rbr20 Firmware
Netgear rbs20 Firmware
Netgear xr300 Firmware

Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear r6230
Netgear r6260
Netgear r7000
Netgear r8900
Netgear r9000
Netgear rbr20
Netgear rbr50
Netgear rbs20
Netgear rbs50
Netgear xr300
Vendors & Products Netgear
Netgear r6230
Netgear r6260
Netgear r7000
Netgear r8900
Netgear r9000
Netgear rbr20
Netgear rbr50
Netgear rbs20
Netgear rbs50
Netgear xr300

Wed, 28 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26.
References

Subscriptions

Netgear R6230 R6230 Firmware R6260 R6260 Firmware R7000 R7000 Firmware R8900 R8900 Firmware R9000 R9000 Firmware Rax120 Rax120 Firmware Rax120v2 Rax120v2 Firmware Rbr20 Rbr20 Firmware Rbr50 Rbs20 Rbs20 Firmware Rbs50 Xr300 Xr300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-29T18:52:26.839Z

Reserved: 2022-09-12T00:00:00.000Z

Link: CVE-2022-40619

cve-icon Vulnrichment

Updated: 2026-01-29T18:52:22.233Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T19:16:18.893

Modified: 2026-03-09T14:43:22.340

Link: CVE-2022-40619

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-29T09:17:38Z

Weaknesses