{"id": "CVE-2022-40620", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.7, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.5, "exploitabilityScore": 2.2}]}, "published": "2026-01-28T19:16:19.773", "references": [{"url": "https://kb.netgear.com/000065132/Security-Advisory-for-Vulnerabilities-in-FunJSQ-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2022-0117", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.onekey.com/resource/security-advisory-netgear-routers-funjsq-vulnerabilities", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-295"}]}], "descriptions": [{"lang": "en", "value": "FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. An attacker (suitably positioned on the network) could intercept the update request and deliver a malicious update package in order to gain arbitrary code execution on affected devices. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26."}, {"lang": "es", "value": "FunJSQ, un m\u00f3dulo de terceros integrado en algunos routers NETGEAR y sistemas WiFi Orbi, no valida correctamente los certificados TLS al descargar paquetes de actualizaci\u00f3n a trav\u00e9s de su mecanismo de autoactualizaci\u00f3n. Un atacante (posicionado adecuadamente en la red) podr\u00eda interceptar la solicitud de actualizaci\u00f3n y entregar un paquete de actualizaci\u00f3n malicioso para obtener ejecuci\u00f3n de c\u00f3digo arbitrario en los dispositivos afectados. Esto afecta a R6230 anterior a 1.1.0.112, R6260 anterior a 1.1.0.88, R7000 anterior a 1.0.11.134, R8900 anterior a 1.0.5.42, R9000 anterior a 1.0.5.42, y XR300 anterior a 1.0.3.72 y Orbi RBR20 anterior a 2.7.2.26, RBR50 anterior a 2.7.4.26, RBS20 anterior a 2.7.2.26, y RBS50 anterior a 2.7.4.26."}], "lastModified": "2026-03-09T14:41:45.690", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA89FD9D-321A-4AC0-BA34-99E1E44E9F6E", "versionEndExcluding": "2.7.2.26"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AE5DBD66-9C2A-4EFF-87AB-03E791D584B5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18AC4290-2157-47C6-822B-6D74AA1555D4", "versionEndExcluding": "1.1.0.112"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C91CADFA-59DB-4B6C-A914-848884F4A4BD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "035DDBDE-4099-4740-B029-968CFC8F8A9A", "versionEndExcluding": "1.1.0.88"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C395D49-57F9-4BC1-8619-57127355B86B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5376DD03-0DDD-4B0C-A185-EC226515B32A", "versionEndExcluding": "1.0.11.134"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28E8F8CF-434B-4AA9-81B7-8814A6640DF5", "versionEndExcluding": "1.0.5.42"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0F859165-8D89-4CDD-9D48-9C7923D2261F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB2F24D5-B4E8-4C06-B6EC-8FF579A18755", "versionEndExcluding": "1.0.5.42"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D74F1BFC-562E-4E7D-BBAB-2F8B593B5A57"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9462FE4-2215-4247-9F28-B2AB72B68E32", "versionEndExcluding": "1.2.8.40"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1742BD56-84E4-40E1-8C04-098B3715161E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rax120v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A31C1203-2E92-40BF-AC9A-1344E531ACA2", "versionEndExcluding": "1.2.8.40"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rax120v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "50D741E6-43F9-4BDC-B1A4-281AC73A7C19"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "004CA551-E868-447C-B853-3A13E5956C3B", "versionEndExcluding": "1.0.3.72"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5590CF28-B88A-4755-904B-1BC1778FBEDD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB4593AB-3CBD-4C18-AC19-0A7F60FB4AE4", "versionEndExcluding": "2.7.2.26"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "14FC7F5B-7E4F-4A68-8427-D1F553EBE8CA"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}