
CVE-2023-0849 – Netgear WNDR3700v2 Web Interface command injection
https://notcve.org/view.php?id=CVE-2023-0849
15 Feb 2023 — A vulnerability has been found in Netgear WNDR3700v2 1.0.1.14 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.221152 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2023-0848 – Netgear WNDR3700v2 Web Management Interface denial of service
https://notcve.org/view.php?id=CVE-2023-0848
15 Feb 2023 — A vulnerability was found in Netgear WNDR3700v2 1.0.1.14. It has been rated as problematic. This issue affects some unknown processing of the component Web Management Interface. The manipulation leads to denial of service. The attack may be initiated remotely. • https://vuldb.com/?ctiid.221147 • CWE-404: Improper Resource Shutdown or Release •

CVE-2023-24498 – Netgear ProSAFE 24 Port 10/100 FS726TP - CWE-522: Insufficiently Protected Credentials.
https://notcve.org/view.php?id=CVE-2023-24498
15 Feb 2023 — An uspecified endpoint in the web server of the switch does not properly authenticate the user identity, and may allow downloading a config page with the password to the switch in clear text. • https://www.gov.il/en/Departments/faq/cve_advisories • CWE-522: Insufficiently Protected Credentials •

CVE-2022-48322
https://notcve.org/view.php?id=CVE-2022-48322
13 Feb 2023 — NETGEAR Nighthawk WiFi Mesh systems and routers are affected by a stack-based buffer overflow vulnerability. This affects MR60 before 1.1.7.132, MS60 before 1.1.7.132, R6900P before 1.3.3.154, R7000P before 1.3.3.154, R7960P before 1.4.4.94, and R8000P before 1.4.4.94. • https://kb.netgear.com/000065265/Security-Advisory-for-Pre-authentication-Buffer-Overflow-on-Multiple-Products-PSV-2022-0155 • CWE-787: Out-of-bounds Write •

CVE-2023-23110
https://notcve.org/view.php?id=CVE-2023-23110
02 Feb 2023 — An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless Routers 1.1.2.60 and ... • https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BkBPIeGco • CWE-494: Download of Code Without Integrity Check •

CVE-2022-48176
https://notcve.org/view.php?id=CVE-2022-48176
30 Jan 2023 — Netgear routers R7000P before v1.3.3.154, R6900P before v1.3.3.154, R7960P before v1.4.4.94, and R8000P before v1.4.4.94 were discovered to contain a pre-authentication stack overflow. Se descubrió que los routers Netgear R7000P anteriores a v1.3.3.154, anteriores a v1.3.3.154, R7960P anteriores a v1.4.4.94 y R8000P anteriores a v1.4.4.94 contenían un desbordamiento en la región stack de autenticación previa. • https://hdwsec.fr/blog/20221109-netgear • CWE-787: Out-of-bounds Write •

CVE-2022-47052
https://notcve.org/view.php?id=CVE-2022-47052
25 Jan 2023 — The web interface of the 'Nighthawk R6220 AC1200 Smart Wi-Fi Router' is vulnerable to a CRLF Injection attack that can be leveraged to perform Reflected XSS and HTML Injection. A malicious unauthenticated attacker can exploit this vulnerability using a specially crafted URL. This affects firmware versions: V1.1.0.112_1.0.1, V1.1.0.114_1.0.1. • https://github.com/dest-3/CVE-2022-47052 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2022-48196
https://notcve.org/view.php?id=CVE-2022-48196
30 Dec 2022 — Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94. Ciertos dispositivos NETGEAR se ven afectados por un desbordamiento del búfer provocado por un atacante no autenticado. Esto afecta a RAX40 antes de 1.0.2.60, RAX35 antes de 1.0.2.60, ... • https://kb.netgear.com/000065495/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2019-0208 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-46422
https://notcve.org/view.php?id=CVE-2022-46422
20 Dec 2022 — An issue in Netgear WNR2000 v1 1.2.3.7 and earlier allows authenticated attackers to cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. Un problema en Netgear WNR2000 v1 1.2.3.7 y anteriores permite a atacantes autenticados provocar una Denegación de Servicio (DoS) mediante la carga de una imagen de firmware manipulada durante el proceso de actualización del firmware. • https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/B1bFKBWwi •

CVE-2022-46423
https://notcve.org/view.php?id=CVE-2022-46423
20 Dec 2022 — An exploitable firmware modification vulnerability was discovered on the Netgear WNR2000v1 router. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v1.2.3.7 and earlier. Se descubrió una vulnerabilidad de modificación de firmware explotable en el router Netgear WNR2000v1. Un atacante puede realizar un ataque MITM (Man-in-the-Middle) para ... • https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BktKl8ZDo •