
CVE-2021-20172
https://notcve.org/view.php?id=CVE-2021-20172
30 Dec 2021 — All known versions of the Netgear Genie Installer for macOS contain a local privilege escalation vulnerability. The installer of the macOS version of Netgear Genie handles certain files in an insecure way. A malicious actor who has local access to the endpoint on which the software is going to be installed may overwrite certain files to obtain privilege escalation to root. Todas las versiones conocidas del instalador de Netgear Genie para macOS contienen una vulnerabilidad de escalada de privilegios local. ... • https://www.tenable.com/security/research/tra-2021-56 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2021-20169
https://notcve.org/view.php?id=CVE-2021-20169
30 Dec 2021 — Netgear RAX43 version 1.0.3.96 does not utilize secure communications to the web interface. By default, all communication to/from the device is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext. Netgear RAX43 versión 1.0.3.96, no usa comunicaciones seguras con la interfaz web. Por defecto, toda la comunicación hacia/desde el dispositivo se envía por medio de HTTP, lo que causa que información potencialmente confidencial (como nombr... • https://www.tenable.com/security/research/tra-2021-55 • CWE-319: Cleartext Transmission of Sensitive Information •

CVE-2021-20167
https://notcve.org/view.php?id=CVE-2021-20167
30 Dec 2021 — Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter. Netgear RAX43 versión 1.0.3.96, contiene una vulnerabilidad de inyección de comandos. La aplicación readycloud cgi es vulnerable a la inyección de comandos en el parámetro name. • https://www.tenable.com/security/research/tra-2021-55 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2021-20168
https://notcve.org/view.php?id=CVE-2021-20168
30 Dec 2021 — Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin. Netgear RAX43 versión 1.0.3.96, no presenta suficientes protecciones para la interfaz UART. Un actor malicioso con acceso físico al dispositivo es capaz de conectarse al puerto UART por medio d... • https://www.tenable.com/security/research/tra-2021-55 • CWE-287: Improper Authentication •

CVE-2021-20166
https://notcve.org/view.php?id=CVE-2021-20166
30 Dec 2021 — Netgear RAX43 version 1.0.3.96 contains a buffer overrun vulnerability. The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton. Netgear RAX43 versión 1.0.3.96, contiene una vulnerabilidad de desbordamiento de búfer. La funcionalidad URL parsing en el endpoint cgi-bin del enrutador contiene un problema de desbordamiento del búfer que puede redirigir el flujo de control de la aplicación. • https://www.tenable.com/security/research/tra-2021-55 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2021-20171
https://notcve.org/view.php?id=CVE-2021-20171
30 Dec 2021 — Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. Netgear RAX43 versión 1.0.3.96, almacena información confidencial en texto plano. Todos los nombres de usuario y contraseñas de los servicios asociados al dispositivo se almacenan en texto plano en el dispositivo. • https://www.tenable.com/security/research/tra-2021-55 • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2021-20170
https://notcve.org/view.php?id=CVE-2021-20170
30 Dec 2021 — Netgear RAX43 version 1.0.3.96 makes use of hardcoded credentials. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted. This encryption is accomplished via a password-protected zip file with a hardcoded password (RAX50w!a4udk). By unzipping the configuration using this password, a user can reconfigure settings not intended to be manipulated, re-zip the configuration, and restore a backup causing these settings to be changed... • https://www.tenable.com/security/research/tra-2021-55 • CWE-798: Use of Hard-coded Credentials •

CVE-2021-45493
https://notcve.org/view.php?id=CVE-2021-45493
26 Dec 2021 — Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects RAX35 before 1.0.4.102, RAX38 before 1.0.4.102, and RAX40 before 1.0.4.102. Determinados dispositivos NETGEAR están afectados por una divulgación de credenciales administrativas. Esto afecta a RAX35 versiones anteriores a 1.0.4.102, RAX38 versiones anteriores a 1.0.4.102 y RAX40 versiones anteriores a 1.0.4.102 • https://kb.netgear.com/000064453/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-Routers-PSV-2019-0293 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2021-45494
https://notcve.org/view.php?id=CVE-2021-45494
26 Dec 2021 — Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10. Determinados dispositivos NETGEAR están afectados por una capacidad de un atacante de leer archivos arbitrarios. Esto afecta a RBK352 versiones anteriores a 4.4.0.10, RBR350 versiones anteriores a 4.4.0.10 y RBS350 versiones anteriores a 4.4.0.10 • https://kb.netgear.com/000064160/Security-Advisory-for-Arbitrary-File-Read-on-Some-WiFi-Systems-PSV-2021-0044 •

CVE-2021-45495
https://notcve.org/view.php?id=CVE-2021-45495
26 Dec 2021 — NETGEAR D7000 devices before 1.0.1.68 are affected by authentication bypass. Los dispositivos NETGEAR D7000 versiones anteriores a 1.0.1.68, están afectados por una omisión de autenticación • https://kb.netgear.com/000064055/Security-Advisory-for-Authentication-Bypass-on-D7000-PSV-2018-0631 •