Netgear FM114P firmware 1.3 wireless firewall, when configured to backup configuration information, stores DDNS (DynDNS) user name and password, MAC address filtering table and possibly other information in cleartext, which could allow local users to obtain sensitive information.
Max CVSS
7.1
EPSS Score
0.19%
Published
2002-12-31
Updated
2008-09-05
Netgear FM114P firmware 1.3 wireless firewall allows remote attackers to cause a denial of service (crash or hang) via a large number of TCP connection requests.
Max CVSS
7.8
EPSS Score
0.29%
Published
2002-12-31
Updated
2008-09-05
Netgear RM-356 and RT-338 series SOHO routers allow remote attackers to cause a denial of service (crash) via a UDP port scan, as demonstrated using nmap.
Max CVSS
5.0
EPSS Score
0.32%
Published
2002-12-31
Updated
2008-09-05
Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26 uses a default administrator password and accepts admin logins on the external interface, which allows remote attackers to gain privileges if the password is not changed.
Max CVSS
7.5
EPSS Score
0.32%
Published
2002-12-31
Updated
2008-09-05
NETGEAR FM114P allows remote attackers to bypass access restrictions for web sites via a URL that uses the IP address instead of the hostname.
Max CVSS
7.5
EPSS Score
0.70%
Published
2002-12-31
Updated
2009-10-14
Cross-site scripting vulnerability in web administration interface for NetGear RT314 and RT311 Gateway Routers allows remote attackers to execute arbitrary script on another client via a URL that contains the script.
Max CVSS
7.5
EPSS Score
0.87%
Published
2002-05-29
Updated
2016-10-18
Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26, when configured to block traffic below port 1024, allows remote attackers to cause a denial of service (hang) via a port scan of the WAN port.
Max CVSS
5.0
EPSS Score
0.29%
Published
2002-03-25
Updated
2008-11-04
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!