Description
An insufficient input validation vulnerability in the NETGEAR XR1000v2
allows attackers connected to the router's LAN to execute OS command
injections.
Published: 2026-01-13
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via OS Command Injection
Action: Patch Immediately
AI Analysis

Impact

The vulnerability stems from an insufficient input validation flaw that allows an attacker connected to the router’s LAN to inject and execute arbitrary operating‑system commands. This flaw can lead to full compromise of the device, enabling an attacker to access sensitive network resources, modify configuration, or launch further attacks against other devices on the local network.

Affected Systems

Affects the NETGEAR Nighthawk XR1000v2 router. All firmware versions earlier than 1.1.2.34 are vulnerable. The issue is specific to the XR1000v2 model; devices with firmware 1.1.2.34 or newer are considered patched.

Risk and Exploitability

The severity scored as CVSS 6.1 indicates a moderate level of risk, while the EPSS score of less than 1% suggests a low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely local network; an attacker must establish a connection to the router’s LAN interface to exploit the flaw. No additional prerequisites beyond LAN access are specified in the advisory.

Generated by OpenCVE AI on April 18, 2026 at 06:45 UTC.

Remediation

Vendor Solution

Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update it to the latest. Fixed in: XR1000v2 Firmware v1.1.2.34 or later https://www.netgear.com/support/product/xr1000v2


OpenCVE Recommended Actions

  • Update the router firmware to version 1.1.2.34 or later via the Netgear support page or enable automatic firmware updates to receive this patch automatically.
  • If a firmware upgrade cannot be performed, immediately block or restrict access to the router’s LAN interfaces that process user input, effectively disabling the vulnerable endpoint for connected devices.
  • Apply network segmentation or use VLANs to isolate unmanaged or potentially compromised LAN devices from the router’s administration network, limiting the attack surface until a firmware update is applied.

Generated by OpenCVE AI on April 18, 2026 at 06:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgear xr1000v2 Firmware
CPEs cpe:2.3:h:netgear:xr1000v2:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:xr1000v2_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear xr1000v2 Firmware
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 16:30:00 +0000


Tue, 13 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Description An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows attackers connected to the router's LAN to execute OS command injections.
Title Insufficient input validation in NETGEAR Nighthawk router XR1000v2
First Time appeared Netgear
Netgear xr1000v2
Weaknesses CWE-20
CPEs cpe:2.3:h:netgear:xr1000v2:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear xr1000v2
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/S:N/AU:N/R:U/V:D/RE:M/U:Amber'}


Subscriptions

Netgear Xr1000v2 Xr1000v2 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NETGEAR

Published:

Updated: 2026-02-26T15:04:44.409Z

Reserved: 2025-12-03T04:16:12.706Z

Link: CVE-2026-0406

cve-icon Vulnrichment

Updated: 2026-01-13T18:49:12.661Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T16:16:10.690

Modified: 2026-02-20T19:42:29.023

Link: CVE-2026-0406

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:45:23Z

Weaknesses