Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP Netgear R8500 multiple parameters command injection attempt

Rule Explanation

This rule specifically looks for the injection of commands to the Netgear R8500 series' sysNewPasswd= and sysConfirmPasswd= parameters. This will stop those attempts.

What To Look For

This rule will alert when an attempt to perform a command injection attack against a Netgear device.

Known Usage

Public information/Proof of Concept available

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Exploit Public-Facing Application

For reference, see the MITRE ATT&CK vulnerability types here:

Rule Vulnerability

Command Injection

Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.

CVE Additional Information