FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26.

Project Subscriptions

Vendors Products
Netgear Subscribe
R6230 Firmware Subscribe
R6260 Firmware Subscribe
R7000 Firmware Subscribe
R8900 Firmware Subscribe
R9000 Firmware Subscribe
Rax120 Firmware Subscribe
Rax120v2 Subscribe
Rax120v2 Firmware Subscribe
Rbr20 Firmware Subscribe
Rbs20 Firmware Subscribe
Xr300 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgear r6230 Firmware
Netgear r6260 Firmware
Netgear r7000 Firmware
Netgear r8900 Firmware
Netgear r9000 Firmware
Netgear rax120
Netgear rax120 Firmware
Netgear rax120v2
Netgear rax120v2 Firmware
Netgear rbr20 Firmware
Netgear rbs20 Firmware
Netgear xr300 Firmware
CPEs cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax120v2:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax120v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear r6230 Firmware
Netgear r6260 Firmware
Netgear r7000 Firmware
Netgear r8900 Firmware
Netgear r9000 Firmware
Netgear rax120
Netgear rax120 Firmware
Netgear rax120v2
Netgear rax120v2 Firmware
Netgear rbr20 Firmware
Netgear rbs20 Firmware
Netgear xr300 Firmware

Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear r6230
Netgear r6260
Netgear r7000
Netgear r8900
Netgear r9000
Netgear rbr20
Netgear rbr50
Netgear rbs20
Netgear rbs50
Netgear xr300
Vendors & Products Netgear
Netgear r6230
Netgear r6260
Netgear r7000
Netgear r8900
Netgear r9000
Netgear rbr20
Netgear rbr50
Netgear rbs20
Netgear rbs50
Netgear xr300

Wed, 28 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-29T18:52:26.839Z

Reserved: 2022-09-12T00:00:00.000Z

Link: CVE-2022-40619

cve-icon Vulnrichment

Updated: 2026-01-29T18:52:22.233Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T19:16:18.893

Modified: 2026-03-09T14:43:22.340

Link: CVE-2022-40619

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-29T09:17:38Z

Weaknesses