Description
An insufficient input validation vulnerability in NETGEAR Orbi routers
allows attackers connected to the router's LAN to execute OS command
injections.
Published: 2026-01-13
Score: 1.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Patch Now
AI Analysis

Impact

An insufficient input validation flaw in NETGEAR Orbi routers permits an attacker who can connect to the router’s LAN to inject and execute arbitrary operating system commands. The weakness is a classic CWE‑20 scenario, where unsanitized input is passed directly to system calls, enabling the attacker to control command execution on the device. Successful exploitation could allow modification of router configuration, creation of backdoors, or use of the device as a foothold to infiltrate other network equipment.

Affected Systems

Affected devices include NETGEAR Orbi models RBE970, RBE971, RBR750, RBR850, RBR860, RBRE960, RBS750, RBS850, RBS860, and RBSE960. Firmware updates that address the issue start with RBE971 9.10.0.2 or later, RBE970 9.10.0.2 or later, RBR750, RBR850, RBR860, RBS750, RBS850, RBS860 7.2.8.5 or later, and RBRE960 and RBSE960 7.2.7.15 or later. Devices running earlier firmware versions are susceptible.

Risk and Exploitability

With a CVSS score of 1.1 and an EPSS of less than 1%, the technical severity appears low, yet the flaw remains tactically valuable while an attacker is present on the LAN. Because the attack vector requires local network access and the vendor does not list this CVE in the KEV catalog, the likelihood of widespread exploitation is modest, but the impact of successful exploitation—remote command execution—remains high. Ensuring that only trusted hosts can reach the router’s management interfaces and promptly applying the listed firmware upgrades mitigates the threat.

Generated by OpenCVE AI on April 18, 2026 at 16:23 UTC.

Remediation

Vendor Solution

Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update it to the latest. Fixed in: RBE971 firmware 9.10.0.2 or later https://www.netgear.com/support/product/rbe971 RBE970 firmware 9.10.0.2 or later https://www.netgear.com/support/product/rbe970 RBR750 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr750 RBR850 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr850 RBR860 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbr860 RBS750 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs750 RBS850 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs850 RBS860 firmware 7.2.8.5 or later https://www.netgear.com/support/product/rbs860 RBRE960 firmware 7.2.7.15 or later https://www.netgear.com/support/product/rbre960 RBSE960 firmware 7.2.7.15 or later https://www.netgear.com/support/product/rbse960


OpenCVE Recommended Actions

  • Update the router firmware to the latest release that includes the fix: for RBE971 and RBE970 use firmware 9.10.0.2 or newer; for RBR750, RBR850, RBR860, RBS750, RBS850, and RBS860 use firmware 7.2.8.5 or newer; for RBRE960 and RBSE960 use firmware 7.2.7.15 or newer.
  • Enable the router’s automatic update feature so that future security patches are installed without manual intervention.
  • Limit LAN hosts that can access the router’s configuration interface by implementing network segmentation, MAC/IP filtering, or a firewall rule that blocks all but essential traffic until the devices are fully updated.

Generated by OpenCVE AI on April 18, 2026 at 16:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgear rbe970 Firmware
Netgear rbe971 Firmware
Netgear rbr750 Firmware
Netgear rbr850 Firmware
Netgear rbr860 Firmware
Netgear rbre960 Firmware
Netgear rbs750 Firmware
Netgear rbs850 Firmware
Netgear rbs860 Firmware
Netgear rbse960 Firmware
CPEs cpe:2.3:h:netgear:rbe970:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbe971:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr860:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbre960:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs860:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbse960:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbe970_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbe971_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbr860_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbre960_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbs860_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rbse960_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear rbe970 Firmware
Netgear rbe971 Firmware
Netgear rbr750 Firmware
Netgear rbr850 Firmware
Netgear rbr860 Firmware
Netgear rbre960 Firmware
Netgear rbs750 Firmware
Netgear rbs850 Firmware
Netgear rbs860 Firmware
Netgear rbse960 Firmware
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 13 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 16:30:00 +0000


Tue, 13 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Description An insufficient input validation vulnerability in NETGEAR Orbi routers allows attackers connected to the router's LAN to execute OS command injections.
Title Insufficient input validation in NETGEAR Orbi routers
First Time appeared Netgear
Netgear rbe970
Netgear rbe971
Netgear rbr750
Netgear rbr850
Netgear rbr860
Netgear rbre960
Netgear rbs750
Netgear rbs850
Netgear rbs860
Netgear rbse960
Weaknesses CWE-20
CPEs cpe:2.3:h:netgear:rbe970:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbe971:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr750:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr850:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbr860:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbre960:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs850:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbs860:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rbse960:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear rbe970
Netgear rbe971
Netgear rbr750
Netgear rbr850
Netgear rbr860
Netgear rbre960
Netgear rbs750
Netgear rbs850
Netgear rbs860
Netgear rbse960
References
Metrics cvssV4_0

{'score': 1.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber'}


Subscriptions

Netgear Rbe970 Rbe970 Firmware Rbe971 Rbe971 Firmware Rbr750 Rbr750 Firmware Rbr850 Rbr850 Firmware Rbr860 Rbr860 Firmware Rbre960 Rbre960 Firmware Rbs750 Rbs750 Firmware Rbs850 Rbs850 Firmware Rbs860 Rbs860 Firmware Rbse960 Rbse960 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NETGEAR

Published:

Updated: 2026-02-26T15:04:45.176Z

Reserved: 2025-12-03T04:16:02.333Z

Link: CVE-2026-0403

cve-icon Vulnrichment

Updated: 2026-01-13T19:08:24.923Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T16:16:10.150

Modified: 2026-02-20T19:38:39.640

Link: CVE-2026-0403

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:30:05Z

Weaknesses