Page 4 of 55 results (0.016 seconds)

CVSS: 9.8EPSS: 0%CPEs: 34EXPL: 0

Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.66, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, AC2600 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62. Determinados dispositivos NETGEAR, están afectados por una omisión de autenticación. Esto afecta a D6200 versiones anteriores a 1.1.00.40, D7000 versiones anteriores a 1.0.1.78, R6020 versiones anteriores a 1.0.0.42, R6080 versiones anteriores a 1.0.0.42, R6050 versiones anteriores a 1.0.1.26, JR6150 versiones anteriores a 1.0.1.26, R6120 versiones anteriores a 1.0.0.66, R6220 versiones anteriores a 1.1.0.100, R6260 versiones anteriores a 1.1.0.66, R6700v2 versiones anteriores a 1.2.0.62, R6800 versiones anteriores a 1.2.0.62, R6900v2 versiones anteriores a 1.2.0.62, AC2100 versiones anteriores a 1.2.0.62, AC2400 versiones anteriores a 1.2.0.62, AC2600 versiones anteriores a 1.2.0.62, R7450 versiones anteriores a 1.2.0.62 y WNR2020 versiones anteriores a 1.1.0.62 • https://kb.netgear.com/000062325/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2019-0109 •

CVSS: 6.5EPSS: 0%CPEs: 22EXPL: 0

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers with firmware 1.0.66. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. • https://kb.netgear.com/000062304/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2020-0258 https://www.zerodayinitiative.com/advisories/ZDI-20-1176 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 8.8EPSS: 0%CPEs: 10EXPL: 0

Certain NETGEAR devices are affected by authentication bypass. This affects JNR1010v2 before 1.1.0.48, JWNR2010v5 before 1.1.0.48, WNR1000v4 before 1.1.0.48, WNR2020 before 1.1.0.48, and WNR2050 before 1.1.0.48. Determinados dispositivos de NETGEAR están afectados por una omisión de autenticación. Esto afecta a JNR1010v2 versiones anteriores a 1.1.0.48, JWNR2010v5 versiones anteriores a 1.1.0.48, WNR1000v4 versiones anteriores a 1.1.0.48, WNR2020 versiones anteriores a 1.1.0.48, y WNR2050 versiones anteriores a 1.1.0.48. • https://kb.netgear.com/000055110/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2017-0748 • CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

Certain NETGEAR devices are affected by mishandling of repeated URL calls. This affects JNR1010v2 before 2017-01-06, WNR614 before 2017-01-06, WNR618 before 2017-01-06, JWNR2000v5 before 2017-01-06, WNR2020 before 2017-01-06, JWNR2010v5 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2020v2 before 2017-01-06, R6220 before 2017-01-06, and WNDR3700v5 before 2017-01-06. Determinados dispositivos de NETGEAR están afectados por el manejo inapropiado de llamadas URL repetidas. Esto afecta a JNR1010v2 hasta el 06-01-2017 WNR614 hasta el 06-01-2017, WNR618 hasta el 06-01-2017, JWNR2000v5 hasta el 06-01-2017, WNR2020 hasta el 06-01-2017, JWNR2010v5 hasta el 06-01-2017, WNR1000v4 hasta el 06-01-2017, WNR2020v2 hasta el 06-01-2017, R6220 hasta el 06-01-2017, y WNDR3700v5 hasta el 06-01-2017. • https://kb.netgear.com/29960/NETGEAR-Product-Vulnerability-Advisory-Potential-security-issue-associated-with-remote-management • CWE-287: Improper Authentication •

CVSS: 4.8EPSS: 0%CPEs: 20EXPL: 0

Certain NETGEAR devices are affected by reflected XSS. This affects JNR1010v2 before 1.1.0.46, JR6150 before 1.0.1.10, JWNR2010v5 before 1.1.0.46, PR2000 before 1.0.0.20, R6050 before 1.0.1.10, R6220 before 1.1.0.60, WNDR3700v5 before 1.1.0.50, WNR1000v4 before 1.1.0.46, WNR2020 before 1.1.0.46, and WNR2050 before 1.1.0.46. Determinados dispositivos NETGEAR están afectados por una vulnerabilidad de tipo XSS reflejado. Esto afecta a JNR1010v2 versiones anteriores a 1.1.0.46, JR6150 versiones anteriores a 1.0.1.10, JWNR2010v5 versiones anteriores a 1.1.0.46, PR2000 versiones anteriores a 1.0.0.20, R6050 versiones anteriores a 1.0.1. 10, R6220 versiones anteriores a 1.1.0.60, WNDR3700v5 versiones anteriores a 1.1.0.50, WNR1000v4 versiones anteriores a 1.1.0.46, WNR2020 versiones anteriores a 1.1.0.46, y WNR2050 versiones anteriores a 1.1.0.46. • https://kb.netgear.com/000055140/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-2514 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •