// For flags

CVE-2021-45530

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R7000 before 1.0.11.126, R7960P before 1.4.2.84, R8000 before 1.0.4.74, RAX200 before 1.0.4.120, R8000P before 1.4.2.84, RAX20 before 1.0.2.82, RAX45 before 1.0.2.82, RAX80 before 1.0.4.120, R7900P before 1.4.2.84, RAX15 before 1.0.2.82, RAX50 before 1.0.2.82, and RAX75 before 1.0.4.120.

Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer por parte de un usuario autenticado. Esto afecta a R7000 versiones anteriores a 1.0.11.126, a R7960P versiones anteriores a 1.4.2.84, a R8000 versiones anteriores a 1.0.4.74, a RAX200 versiones anteriores a 1.0.4.120, a R8000P versiones anteriores a 1.4.2.84, a RAX20 versiones anteriores a 1.0.2.82, a RAX45 versiones anteriores a 1.0.2.82, a RAX80 versiones anteriores a 1.0.4.120, a RAX80 versiones anteriores a 1.0.4.120. 0.2.82, RAX45 versiones anteriores a 1.0.2.82, RAX80 versiones anteriores a 1.0.4.120, R7900P versiones anteriores a 1.4.2.84, RAX15 versiones anteriores a 1.0.2.82, RAX50 versiones anteriores a 1.0.2.82 y RAX75 versiones anteriores a 1.0.4.120

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-12-25 CVE Reserved
  • 2021-12-26 CVE Published
  • 2023-07-18 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
R7000 Firmware
Search vendor "Netgear" for product "R7000 Firmware"
< 1.0.11.126
Search vendor "Netgear" for product "R7000 Firmware" and version " < 1.0.11.126"
-
Affected
in Netgear
Search vendor "Netgear"
R7000
Search vendor "Netgear" for product "R7000"
--
Safe
Netgear
Search vendor "Netgear"
R7000p Firmware
Search vendor "Netgear" for product "R7000p Firmware"
< 1.4.2.84
Search vendor "Netgear" for product "R7000p Firmware" and version " < 1.4.2.84"
-
Affected
in Netgear
Search vendor "Netgear"
R7000p
Search vendor "Netgear" for product "R7000p"
--
Safe
Netgear
Search vendor "Netgear"
R7960p Firmware
Search vendor "Netgear" for product "R7960p Firmware"
< 1.4.2.84
Search vendor "Netgear" for product "R7960p Firmware" and version " < 1.4.2.84"
-
Affected
in Netgear
Search vendor "Netgear"
R7960p
Search vendor "Netgear" for product "R7960p"
--
Safe
Netgear
Search vendor "Netgear"
R8000 Firmware
Search vendor "Netgear" for product "R8000 Firmware"
< 1.0.4.74
Search vendor "Netgear" for product "R8000 Firmware" and version " < 1.0.4.74"
-
Affected
in Netgear
Search vendor "Netgear"
R8000
Search vendor "Netgear" for product "R8000"
--
Safe
Netgear
Search vendor "Netgear"
R8000p Firmware
Search vendor "Netgear" for product "R8000p Firmware"
< 1.4.2.84
Search vendor "Netgear" for product "R8000p Firmware" and version " < 1.4.2.84"
-
Affected
in Netgear
Search vendor "Netgear"
R8000p
Search vendor "Netgear" for product "R8000p"
--
Safe
Netgear
Search vendor "Netgear"
Rax20 Firmware
Search vendor "Netgear" for product "Rax20 Firmware"
< 1.0.2.82
Search vendor "Netgear" for product "Rax20 Firmware" and version " < 1.0.2.82"
-
Affected
in Netgear
Search vendor "Netgear"
Rax20
Search vendor "Netgear" for product "Rax20"
--
Safe
Netgear
Search vendor "Netgear"
Rax200 Firmware
Search vendor "Netgear" for product "Rax200 Firmware"
< 1.0.4.120
Search vendor "Netgear" for product "Rax200 Firmware" and version " < 1.0.4.120"
-
Affected
in Netgear
Search vendor "Netgear"
Rax200
Search vendor "Netgear" for product "Rax200"
--
Safe
Netgear
Search vendor "Netgear"
Rax45 Firmware
Search vendor "Netgear" for product "Rax45 Firmware"
< 1.0.2.82
Search vendor "Netgear" for product "Rax45 Firmware" and version " < 1.0.2.82"
-
Affected
in Netgear
Search vendor "Netgear"
Rax45
Search vendor "Netgear" for product "Rax45"
--
Safe
Netgear
Search vendor "Netgear"
Rax15 Firmware
Search vendor "Netgear" for product "Rax15 Firmware"
< 1.0.2.82
Search vendor "Netgear" for product "Rax15 Firmware" and version " < 1.0.2.82"
-
Affected
in Netgear
Search vendor "Netgear"
Rax15
Search vendor "Netgear" for product "Rax15"
--
Safe
Netgear
Search vendor "Netgear"
Rax75 Firmware
Search vendor "Netgear" for product "Rax75 Firmware"
< 1.0.4.120
Search vendor "Netgear" for product "Rax75 Firmware" and version " < 1.0.4.120"
-
Affected
in Netgear
Search vendor "Netgear"
Rax75
Search vendor "Netgear" for product "Rax75"
--
Safe
Netgear
Search vendor "Netgear"
Rax80 Firmware
Search vendor "Netgear" for product "Rax80 Firmware"
< 1.0.4.120
Search vendor "Netgear" for product "Rax80 Firmware" and version " < 1.0.4.120"
-
Affected
in Netgear
Search vendor "Netgear"
Rax80
Search vendor "Netgear" for product "Rax80"
--
Safe
Netgear
Search vendor "Netgear"
Rax50 Firmware
Search vendor "Netgear" for product "Rax50 Firmware"
< 1.0.2.82
Search vendor "Netgear" for product "Rax50 Firmware" and version " < 1.0.2.82"
-
Affected
in Netgear
Search vendor "Netgear"
Rax50
Search vendor "Netgear" for product "Rax50"
--
Safe