CVE-2023-0849 – Netgear WNDR3700v2 Web Interface command injection
https://notcve.org/view.php?id=CVE-2023-0849
A vulnerability has been found in Netgear WNDR3700v2 1.0.1.14 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.221152 https://vuldb.com/?id.221152 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-0848 – Netgear WNDR3700v2 Web Management Interface denial of service
https://notcve.org/view.php?id=CVE-2023-0848
A vulnerability was found in Netgear WNDR3700v2 1.0.1.14. It has been rated as problematic. This issue affects some unknown processing of the component Web Management Interface. The manipulation leads to denial of service. The attack may be initiated remotely. • https://vuldb.com/?ctiid.221147 https://vuldb.com/?id.221147 • CWE-404: Improper Resource Shutdown or Release •
CVE-2023-24498 – Netgear ProSAFE 24 Port 10/100 FS726TP - CWE-522: Insufficiently Protected Credentials.
https://notcve.org/view.php?id=CVE-2023-24498
An uspecified endpoint in the web server of the switch does not properly authenticate the user identity, and may allow downloading a config page with the password to the switch in clear text. • https://www.gov.il/en/Departments/faq/cve_advisories • CWE-522: Insufficiently Protected Credentials •
CVE-2022-48322
https://notcve.org/view.php?id=CVE-2022-48322
NETGEAR Nighthawk WiFi Mesh systems and routers are affected by a stack-based buffer overflow vulnerability. This affects MR60 before 1.1.7.132, MS60 before 1.1.7.132, R6900P before 1.3.3.154, R7000P before 1.3.3.154, R7960P before 1.4.4.94, and R8000P before 1.4.4.94. • https://kb.netgear.com/000065265/Security-Advisory-for-Pre-authentication-Buffer-Overflow-on-Multiple-Products-PSV-2022-0155 • CWE-787: Out-of-bounds Write •
CVE-2023-23110
https://notcve.org/view.php?id=CVE-2023-23110
An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless Routers 1.1.2.60 and earlier, XAVN2001v2 Wireless-N Extenders 0.4.0.7 and earlier, WNR2200 Wireless Routers 1.0.1.102 and earlier, WNR2500 Wireless Routers 1.0.0.34 and earlier, R8900 Smart WiFi Routers 1.0.3.6 and earlier, and R9000 Smart WiFi Routers 1.0.3.6 and earlier. • https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BkBPIeGco https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/H1lIcXbco https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HyZRxmb9s https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1BNhbWqi https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1qWglM5o https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1t47Ebqj https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SJCGkb-9o https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/r1Z4BX-5i https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/ryjVZz-5s https://www.netgear. • CWE-494: Download of Code Without Integrity Check •