Page 3 of 123 results (0.003 seconds)

CVSS: 5.7EPSS: 0%CPEs: 4EXPL: 0

05 Nov 2024 — Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component wlg_adv.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request. Se descubrieron múltiples vulnerabilidades de desbordamiento de pila en el componente wlg_adv.cgi a través de los parámetros apmode_dns1_pri y apmode_dns1_sec en Netgear R8500 v1.0.2... • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_49/49.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

05 Nov 2024 — Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at genie_fix2.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. Se descubrió que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyección de comandos en el parámetro wan_gateway en genie_fix2.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada. • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

05 Nov 2024 — Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at wiz_fix2.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. Se descubrió que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyección de comandos en el parámetro wan_gateway en wiz_fix2.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada. • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

05 Nov 2024 — Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the wan_gateway parameter at bsw_fix.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. Se descubrió que Netgear R8500 v1.0.2.160 contiene una vulnerabilidad de inyección de comandos en el parámetro wan_gateway en bsw_fix.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo mediante una solicitud manipulada. • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_47/47.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

05 Nov 2024 — Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a command injection vulnerability in the component wlg_adv.cgi via the apmode_gateway parameter. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. Se descubrió que Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154 y R6400 v2 1.0.4.128 contienen una vulnerabilidad de inyección de comandos en el componente wlg_adv.cgi a través del parámetro apmode... • https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_48/48.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 1

26 Mar 2022 — NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to admin_account.cgi. Los dispositivos NETGEAR R8500 versión 1.0.2.158, permiten a usuarios remotos autenticados ejecutar comandos arbitrarios (como telnetd) por medio de metacaracteres de shell en los parámetros sysNewPasswd y sysConfirmPasswd del archivo admin_account.cgi • https://github.com/donothingme/VUL/blob/main/vul3/3.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 4%CPEs: 2EXPL: 1

26 Mar 2022 — NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameter. Los dispositivos NETGEAR R8500 versión 1.0.2.158, permiten a usuarios remotos autenticados ejecutar comandos arbitrarios (como telnetd) por medio de metacaracteres de shell en los parámetros ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length o ipv6_lan_length • https://github.com/donothingme/VUL/blob/main/vul1/1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 4%CPEs: 2EXPL: 1

26 Mar 2022 — NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to password.cgi. Los dispositivos NETGEAR R8500 versión 1.0.2.158, permiten a usuarios remotos autenticados ejecutar comandos arbitrarios (como telnetd) por medio de metacaracteres de shell en los parámetros sysNewPasswd y sysConfirmPasswd del archivo password.cgi • https://github.com/donothingme/VUL/blob/main/vul2/2.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 68EXPL: 0

23 Mar 2022 — This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. • https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327 • CWE-863: Incorrect Authorization •

CVSS: 8.8EPSS: 5%CPEs: 56EXPL: 0

23 Mar 2022 — This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://kb.netgear.com/000064720/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Multiple-Products-PSV-2021-0323 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •