
CVE-2022-46424
https://notcve.org/view.php?id=CVE-2022-46424
20 Dec 2022 — An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier. Se descubrió una vulnerabilidad de modificación de firmware explotable en el punto de acceso WiFi Netgear XWN5001 Powerline 500. Un atacante puede ... • https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/B1rKQuzDj •

CVE-2022-47210
https://notcve.org/view.php?id=CVE-2022-47210
16 Dec 2022 — The default console presented to users over telnet (when enabled) is restricted to a subset of commands. Commands issued at this console, however, appear to be fed directly into a system call or other similar function. This allows any authenticated user to execute arbitrary commands on the device. La consola predeterminada que se presenta a los usuarios a través de telnet (cuando está habilitada) está restringida a un subconjunto de comandos. Sin embargo, los comandos emitidos en esta consola parecen enviar... • https://www.tenable.com/security/research/tra-2022-37 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2022-47209
https://notcve.org/view.php?id=CVE-2022-47209
16 Dec 2022 — A support user exists on the device and appears to be a backdoor for Technical Support staff. The default password for this account is “support” and cannot be changed by a user via any normally accessible means. Existe un usuario de soporte en el dispositivo y parece ser un backdoor para el personal de soporte técnico. La contraseña predeterminada para esta cuenta es “support” y no puede ser modificado por un usuario a través de ningún medio normalmente accesible. • https://www.tenable.com/security/research/tra-2022-37 • CWE-287: Improper Authentication •

CVE-2022-47208
https://notcve.org/view.php?id=CVE-2022-47208
16 Dec 2022 — The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication. El servicio ?puhttpsniff?, que se ejecuta de forma predeterminada, es susceptible a la inyección de comandos debido a una entrada de usuario mal sanitizada. • https://www.tenable.com/security/research/tra-2022-37 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2022-4390
https://notcve.org/view.php?id=CVE-2022-4390
09 Dec 2022 — A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned... • https://www.synacktiv.com/en/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html •

CVE-2022-44193
https://notcve.org/view.php?id=CVE-2022-44193
22 Nov 2022 — Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameters: starthour, startminute , endhour, and endminute. Netgear R7000P V1.3.1.64 es vulnerable al desbordamiento del búfer en /usr/sbin/httpd a través de los parámetros: starthour, startminute , endhour, y endminute. • https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/10 • CWE-787: Out-of-bounds Write •

CVE-2022-44197
https://notcve.org/view.php?id=CVE-2022-44197
22 Nov 2022 — Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. Netgear R7000P V1.3.0.8 es vulnerable al desbordamiento del búfer mediante el parámetro openvpn_server_ip. • https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/15 • CWE-787: Out-of-bounds Write •

CVE-2022-44191
https://notcve.org/view.php?id=CVE-2022-44191
22 Nov 2022 — Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameters KEY1 and KEY2. Netgear R7000P V1.3.1.64 es vulnerable al desbordamiento del búfer a través de los parámetros KEY1 y KEY2. • https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/8 • CWE-787: Out-of-bounds Write •

CVE-2022-44200
https://notcve.org/view.php?id=CVE-2022-44200
22 Nov 2022 — Netgear R7000P V1.3.0.8, V1.3.1.64 is vulnerable to Buffer Overflow via parameters: stamode_dns1_pri and stamode_dns1_sec. Netgear R7000P V1.3.0.8, V1.3.1.64 es vulnerable al desbordamiento del búfer a través de los parámetros: stamode_dns1_pri y stamode_dns1_sec. • https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/17 • CWE-787: Out-of-bounds Write •

CVE-2022-44199
https://notcve.org/view.php?id=CVE-2022-44199
22 Nov 2022 — Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. Netgear R7000P V1.3.1.64 es vulnerable al desbordamiento del búfer mediante el parámetro openvpn_server_ip. • https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/16 • CWE-787: Out-of-bounds Write •