Netgear : Security Vulnerabilities
Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the check_auth function.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear R7100LG 1.0.0.78 was discovered to contain a command injection vulnerability via the password parameter at usb_remote_invite.cgi.
Max Base Score | 9.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.11% |
Netgear EX6200 v1.0.3.94 was discovered to contain a buffer overflow via the wla_temp_ssid parameter at acosNvramConfig_set.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear DC112A 1.0.0.64, EX6200 1.0.3.94 and R6300v2 1.0.4.8 were discovered to contain a buffer overflow via the http_passwd parameter in password.cgi.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear DGN3500 1.1.00.37 was discovered to contain a buffer overflow via the http_password parameter at setup.cgi.
Max Base Score | 6.5 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.04% |
Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the update_auth function.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameters.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear DG834Gv5 1.6.01.34 was discovered to contain multiple buffer overflows via the wla_ssid and wla_temp_ssid parameters at bsw_ssid.cgi.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear R6900P v1.3.3.154 was discovered to contain multiple buffer overflows via the wla_ssid and wlg_ssid parameters at ia_ap_setting.cgi.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Netgear XR300 v1.0.3.78 was discovered to contain multiple buffer overflows via the wla_ssid and wlg_ssid parameters at genie_ap_wifi_change.cgi.
Max Base Score | 8.8 |
Published | 2023-08-07 |
Updated | 2023-08-09 |
EPSS | 0.05% |
Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd.
Max Base Score | 9.8 |
Published | 2023-09-01 |
Updated | 2023-09-07 |
EPSS | 0.21% |
netgear R6250 Firmware Version 1.0.4.48 is vulnerable to Buffer Overflow after authentication.
Max Base Score | 9.8 |
Published | 2023-06-20 |
Updated | 2023-06-28 |
EPSS | 0.09% |
Netgear D6220 with Firmware Version 1.0.0.80, D8500 with Firmware Version 1.0.3.60, R6700 with Firmware Version 1.0.2.26, and R6900 with Firmware Version 1.0.2.26 are vulnerable to Command Injection. If an attacker gains web management privileges, they can inject commands into the post request parameters, gaining shell privileges.
Max Base Score | 8.8 |
Published | 2023-06-06 |
Updated | 2023-06-14 |
EPSS | 0.07% |
There is a command injection vulnerability in the Netgear R6250 router with Firmware Version 1.0.4.48. If an attacker gains web management privileges, they can inject commands into the post request parameters, thereby gaining shell privileges.
Max Base Score | 9.8 |
Published | 2023-06-06 |
Updated | 2023-06-12 |
EPSS | 0.14% |
Buffer Overflow vulnerability found in Netgear R6900 v.1.0.2.26, R6700v3 v.1.0.4.128, R6700 v.1.0.0.26 allows a remote attacker to execute arbitrary code and cause a denial ofservice via the getInputData parameter of the fwSchedule.cgi page.
Max Base Score | 9.8 |
Published | 2023-04-26 |
Updated | 2023-05-08 |
EPSS | 0.22% |
Any request send to a Netgear Nighthawk Wifi6 Router (RAX30)'s web service containing a “Content-Type” of “multipartboundary=” will result in the request body being written to “/tmp/mulipartFile” on the device itself. A sufficiently large file will cause device resources to be exhausted, resulting in the device becoming unusable until it is rebooted.
Max Base Score | 7.5 |
Published | 2023-03-15 |
Updated | 2023-03-21 |
EPSS | 0.05% |
When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device.
Max Base Score | 8.8 |
Published | 2023-03-15 |
Updated | 2023-03-21 |
EPSS | 0.05% |
NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a format string vulnerability in a SOAP service that could allow an attacker to execute arbitrary code on the device.
Max Base Score | 9.8 |
Published | 2023-03-10 |
Updated | 2023-03-16 |
EPSS | 0.13% |
NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerability in various CGI mechanisms that could allow an attacker to execute arbitrary code on the device.
Max Base Score | 9.8 |
Published | 2023-03-10 |
Updated | 2023-03-16 |
EPSS | 0.13% |
NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that unintentionally allows users with upload permissions to execute arbitrary code on the device.
Max Base Score | 8.8 |
Published | 2023-03-10 |
Updated | 2023-03-16 |
EPSS | 0.06% |
NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that allows users with access to this feature to access arbitrary files on the device.
Max Base Score | 6.8 |
Published | 2023-03-10 |
Updated | 2023-03-15 |
EPSS | 0.05% |
An uspecified endpoint in the web server of the switch does not properly authenticate the user identity, and may allow downloading a config page with the password to the switch in clear text.
Max Base Score | 7.5 |
Published | 2023-02-15 |
Updated | 2023-02-24 |
EPSS | 0.09% |
An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless Routers 1.1.2.60 and earlier, XAVN2001v2 Wireless-N Extenders 0.4.0.7 and earlier, WNR2200 Wireless Routers 1.0.1.102 and earlier, WNR2500 Wireless Routers 1.0.0.34 and earlier, R8900 Smart WiFi Routers 1.0.3.6 and earlier, and R9000 Smart WiFi Routers 1.0.3.6 and earlier.
Max Base Score | 7.4 |
Published | 2023-02-02 |
Updated | 2023-02-09 |
EPSS | 0.15% |
A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument USERDBUsers.Password leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Max Base Score | 6.1 |
Published | 2023-04-28 |
Updated | 2023-05-05 |
EPSS | 0.06% |
A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the component Web Management Interface. The manipulation of the argument Login.userAgent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Max Base Score | 6.1 |
Published | 2023-04-28 |
Updated | 2023-05-05 |
EPSS | 0.06% |