Vulnerabilites related to netgear - wac120
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por una vulnerabilidad de tipo CSRF. Esto afecta a WAC120 versiones anteriores a 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11. 4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5, y WN604 versiones anteriores a 3.3.10." } ], "id": "CVE-2018-21096", "lastModified": "2024-11-21T04:02:53.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T16:15:12.663", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28BEFA11-71A8-4FDF-BC54-5AF4D359FF49", "versionEndExcluding": "3.3.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A390A970-3C56-4682-853C-16335E95FD9E", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D36B032D-EB59-40BC-8D04-1AE8746293A8", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5A85E15-3359-4500-808E-D05160C96A5D", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3921F047-FEC6-4AE0-BC6A-B24795970675", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E8F2DEA-7095-451B-90FD-1D94285EC0FC", "versionEndExcluding": "2.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E07F80-C2B1-45E6-BBC9-0CD8B598E2C8", "versionEndExcluding": "3.5.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7D131-F0A6-42BE-B119-20E0A9FCAD34", "versionEndExcluding": "2.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49AFDA75-C33C-421E-B4D7-449570944007", "versionEndExcluding": "2.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por una ejecuci\u00f3n de comandos por medio de un formulario PHP. Esto afecta a WN604 versiones 3.3.3 y anteriores, WNAP210v2 versiones 3.5.20.0 y anteriores, WNAP320 versiones 3.5.20.0 y anteriores, WNDAP350 versiones 3.5.20.0 y anteriores, WNDAP360 versiones 3.5.20.0 y anteriores, WNDAP620 versiones 2.0.11 y anteriores, WNDAP660 versiones 3.5.20.0 y anteriores, WND930 versiones 2.0.11 y anteriores, y WAC120 versiones 2.0.7 y anteriores." } ], "id": "CVE-2017-18863", "lastModified": "2024-11-21T03:21:07.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-28T16:15:12.747", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una vulnerabilidad de tipo CSRF. Esto afecta a WAC120 versiones anteriores a 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11.4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5 y WN604 versiones anteriores a 3.3.10." } ], "id": "CVE-2018-21120", "lastModified": "2024-11-21T04:02:56.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-22T16:15:11.903", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "806B48FE-912E-488A-A89A-3321BF14B351", "versionEndExcluding": "1.3.0.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD64ACCC-A1E0-4D9F-B6E4-8AB8AD7936E5", "versionEndExcluding": "2.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9267B577-EF4D-43A5-BC91-CB363F8EA421", "versionEndExcluding": "2.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7CFEDD-259B-4E40-9308-A071D236D4C7", "versionEndExcluding": "2.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEBD44BB-11A5-45C8-A675-E9CBBB31C48F", "versionEndExcluding": "3.3.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "965D072C-3F4F-49EB-93DB-377E91372214", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E3E920F-B954-4D9F-A918-214A00785A9A", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B6AA52-F11E-4836-AF1D-7682FBD56CA4", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFC5C872-DEC5-47EF-AA32-7D82E8DB9E48", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46CB6AD-BCE4-4A82-B2CC-22190AEB2F3B", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una inyecci\u00f3n de comando. Esto afecta a WAC510 versiones anteriores a la versi\u00f3n 1.3.0.10, WAC120 versiones anteriores a la versi\u00f3n 2.1.4, WNDAP620 versiones anteriores a la versi\u00f3n 2.1.3, WND930 versiones anteriores a la versi\u00f3n 2.1.2, WN604 versiones anteriores a la 3.3. 7, WNDAP660 versiones anteriores a 3.7.4.0, WNDAP350 versiones anteriores a 3.7.4.0, WNAP320 versiones anteriores a 3.7.4.0, WNAP210v2 versiones anteriores a 3.7.4.0, y WNDAP360 versiones anteriores a 3.7.4.0." } ], "id": "CVE-2017-18805", "lastModified": "2024-11-21T03:20:58.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-21T18:15:12.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "806B48FE-912E-488A-A89A-3321BF14B351", "versionEndExcluding": "1.3.0.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD64ACCC-A1E0-4D9F-B6E4-8AB8AD7936E5", "versionEndExcluding": "2.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9267B577-EF4D-43A5-BC91-CB363F8EA421", "versionEndExcluding": "2.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7CFEDD-259B-4E40-9308-A071D236D4C7", "versionEndExcluding": "2.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEBD44BB-11A5-45C8-A675-E9CBBB31C48F", "versionEndExcluding": "3.3.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "965D072C-3F4F-49EB-93DB-377E91372214", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E3E920F-B954-4D9F-A918-214A00785A9A", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B6AA52-F11E-4836-AF1D-7682FBD56CA4", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFC5C872-DEC5-47EF-AA32-7D82E8DB9E48", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46CB6AD-BCE4-4A82-B2CC-22190AEB2F3B", "versionEndExcluding": "3.7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR, est\u00e1n afectados por una inyecci\u00f3n de comandos. Esto afecta a WAC510 versiones anteriores a la versi\u00f3n 1.3.0.10, WAC120 versiones anteriores a la versi\u00f3n 2.1.4, WNDAP620 versiones anteriores a la versi\u00f3n 2.1.3, WND930 versiones anteriores a la versi\u00f3n 2.1.2, WN604 versiones anteriores a la versi\u00f3n 3.3. 7, WNDAP660 versiones anteriores a la versi\u00f3n 3.7.4.0, WNDAP350 versiones anteriores a la versi\u00f3n 3.7.4.0, WNAP320 versiones anteriores a la versi\u00f3n 3.7.4.0, WNAP210v2 versiones anteriores a la versi\u00f3n 3.7.4.0, y WNDAP360 versiones anteriores a la versi\u00f3n 3.7.4.0." } ], "id": "CVE-2017-18806", "lastModified": "2024-11-21T03:20:58.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-21T16:15:51.337", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria por parte de un atacante no autenticado. Esto afecta a WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WAC120 versiones anteriores a 2.1.7, WN604 versiones anteriores a 3.3.10, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3. 7.11.4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, y WND930 versiones anteriores a 2.1.5." } ], "id": "CVE-2018-21097", "lastModified": "2024-11-21T04:02:53.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T16:15:12.710", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
netgear | wac120_firmware | * | |
netgear | wac120 | - | |
netgear | wac505_firmware | * | |
netgear | wac505 | - | |
netgear | wac510_firmware | * | |
netgear | wac510 | - | |
netgear | wnap320_firmware | * | |
netgear | wnap320 | - | |
netgear | wnap210_firmware | * | |
netgear | wnap210 | v2 | |
netgear | wndap350_firmware | * | |
netgear | wndap350 | - | |
netgear | wndap360_firmware | * | |
netgear | wndap360 | - | |
netgear | wndap660_firmware | * | |
netgear | wndap660 | - | |
netgear | wndap620_firmware | * | |
netgear | wndap620 | - | |
netgear | wnd930_firmware | * | |
netgear | wnd930 | - | |
netgear | wn604_firmware | * | |
netgear | wn604 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED872A8-5B73-406B-8044-B1BD50A881EA", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E5414D-8F4F-4E21-B79F-61B14F0C9990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3819D8-D7C6-4491-BCCC-C6ED67C815DF", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A51431E-AD34-4129-8E99-0A6BB8B7DF07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "755E4AE7-BAC6-4526-B6F4-320CE8D319A6", "versionEndExcluding": "5.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "matchCriteriaId": "08B1B759-5015-4489-A2B4-0F580E884868", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFC83243-B576-43FA-9339-90FF51DA75B6", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A66070C-92C0-45CD-A46F-64008E3D2268", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B442489B-A88F-477C-A835-2081891A15CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A80C76F-0F02-43E7-87D3-FCC0898B99B8", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "matchCriteriaId": "C82A16C2-DC48-4792-A4C7-8AC43F84196D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D9BBA36-7705-4829-BD87-2B505E380C3B", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*", "matchCriteriaId": "7975D6EC-1816-4D52-8C87-77C1B6404120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24DDCC0-D625-4810-A7E7-4AAC705F034E", "versionEndExcluding": "3.7.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "matchCriteriaId": "58D2492E-0CDC-4242-9206-7F0453B11CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80", "versionEndExcluding": "2.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "matchCriteriaId": "666A5E55-B07C-4615-A9F0-5CA8C7D40637", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A282C49C-684B-4722-A6AC-CF2131F572A3", "versionEndExcluding": "2.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "matchCriteriaId": "91593610-E45D-450B-AD40-74375DA37EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918C4D1C-A684-47AD-AA42-926715D8568A", "versionEndExcluding": "3.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD31DCAA-BAA5-4463-9EA4-A7076A625407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una configuraci\u00f3n incorrecta de los ajustes de seguridad. Esto afecta a WAC120 versiones anteriores a la versi\u00f3n 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11. 4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5, y WN604 versiones anteriores a 3.3.10." } ], "id": "CVE-2018-21094", "lastModified": "2024-11-21T04:02:53.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-27T15:15:12.143", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202004-1556
Vulnerability from variot
Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the WEB application does not fully verify whether the request comes from a trusted user. An attacker can use this vulnerability to send unexpected requests to the server through the affected client
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1556", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac505", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.5" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.5" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.11.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016301" } ] }, "cve": "CVE-2018-21120", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CVE-2018-21120", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016301", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CNVD-2021-59162", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "id": "CVE-2018-21120", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.5, "id": "CVE-2018-21120", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-016301", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21120", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2018-21120", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2018-016301", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-59162", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202004-1917", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the WEB application does not fully verify whether the request comes from a trusted user. An attacker can use this vulnerability to send unexpected requests to the server through the affected client", "sources": [ { "db": "NVD", "id": "CVE-2018-21120" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNVD", "id": "CNVD-2021-59162" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21120", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2018-016301", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-59162", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1917", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "id": "VAR-202004-1556", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" } ], "trust": 1.065498345 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" } ] }, "last_update_date": "2024-11-23T22:48:01.387000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Cross Site Request Forgery on Some Wireless Access Points, PSV-2018-0095", "trust": 0.8, "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" }, { "title": "Patch for Cross-site request forgery vulnerability in multiple NETGEAR products (CNVD-2021-59162)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/284356" }, { "title": "Multiple NETGEAR Repair measures for product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117250" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21120" }, { "trust": 1.6, "url": "https://kb.netgear.com/000060238/security-advisory-for-cross-site-request-forgery-on-some-wireless-access-points-psv-2018-0095" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21120" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-59162" }, { "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "db": "NVD", "id": "CVE-2018-21120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59162" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "date": "2020-04-22T16:15:11.903000", "db": "NVD", "id": "CVE-2018-21120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2021-59162" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016301" }, { "date": "2020-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1917" }, { "date": "2024-11-21T04:02:56.987000", "db": "NVD", "id": "CVE-2018-21120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1917" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Cross-site request forgery vulnerability in device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016301" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1917" } ], "trust": 0.6 } }
var-202004-1515
Vulnerability from variot
Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier. plural NETGEAR The product contains an injection vulnerability.Information may be obtained and tampered with. This affects WN604 3.3.3 and previous versions, WNAP210v2 3.5.20.0 and previous versions, WNAP320 3.5.20.0 and previous versions, WNDAP350 3.5.20.0 and previous versions, WNDAP360 3.5.20.0 and previous versions, WNDAP620 2.0.11 and previous versions, WNDAP660 3.5.20.0 and previous versions, WND930 2.0.11 and previous versions, and WAC120 2.0.7 and previous versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1515", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wndap660", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wn604", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.3.3" }, { "model": "wac120", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.7" }, { "model": "wndap360", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.0.7" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.3" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" } ] }, "cve": "CVE-2017-18863", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-18863", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-014995", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-18863", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-014995", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18863", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2017-014995", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2262", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-18863", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier. plural NETGEAR The product contains an injection vulnerability.Information may be obtained and tampered with. This affects WN604 3.3.3 and previous versions, WNAP210v2 3.5.20.0 and previous versions, WNAP320 3.5.20.0 and previous versions, WNDAP350 3.5.20.0 and previous versions, WNDAP360 3.5.20.0 and previous versions, WNDAP620 2.0.11 and previous versions, WNDAP660 3.5.20.0 and previous versions, WND930 2.0.11 and previous versions, and WAC120 2.0.7 and previous versions", "sources": [ { "db": "NVD", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "VULMON", "id": "CVE-2017-18863" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18863", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2017-014995", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2262", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-18863", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "id": "VAR-202004-1515", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4443443822222222 }, "last_update_date": "2024-11-23T22:29:38.886000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for PHP Vulnerabilities on Wireless Access Points, PSV-2017-0517 and PSV-2016-0258", "trust": 0.8, "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" }, { "title": "Multiple NETGEAR Fixing measures for product injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117741" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.netgear.com/000037827/security-advisory-for-php-vulnerabilities-on-wireless-access-points-psv-2017-0517-and-psv-2016-0258" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18863" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18863" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/74.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2017-18863" }, { "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "db": "NVD", "id": "CVE-2017-18863" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-28T00:00:00", "db": "VULMON", "id": "CVE-2017-18863" }, { "date": "2020-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "date": "2020-04-28T16:15:12.747000", "db": "NVD", "id": "CVE-2017-18863" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-05T00:00:00", "db": "VULMON", "id": "CVE-2017-18863" }, { "date": "2020-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014995" }, { "date": "2020-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2262" }, { "date": "2024-11-21T03:21:07.387000", "db": "NVD", "id": "CVE-2017-18863" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2262" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Product injection vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014995" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2262" } ], "trust": 0.6 } }
var-202004-1371
Vulnerability from variot
Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.3" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.2" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.7" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014893" } ] }, "cve": "CVE-2017-18806", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-18806", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-014893", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2021-52966", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18806", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18806", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-014893", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18806", "trust": 1.0, "value": "MEDIUM" }, { "author": "cve@mitre.org", "id": "CVE-2017-18806", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2017-014893", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-52966", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "NVD", "id": "CVE-2017-18806" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2017-18806" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNVD", "id": "CNVD-2021-52966" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18806", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2017-014893", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-52966", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1835", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "id": "VAR-202004-1371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" } ], "trust": 1.0737637281818182 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" } ] }, "last_update_date": "2024-11-23T23:07:58.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Command Injection Vulnerability on Some Wireless Access Points, PSV-2017-2214", "trust": 0.8, "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" }, { "title": "Patch for NETGEAR command injection vulnerability (CNVD-2021-52966)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/280076" }, { "title": "Multiple NETGEAR Product Command Injection Vulnerability Fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116311" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18806" }, { "trust": 1.6, "url": "https://kb.netgear.com/000049061/security-advisory-for-command-injection-vulnerability-on-some-wireless-access-points-psv-2017-2214" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18806" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-52966" }, { "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "db": "NVD", "id": "CVE-2017-18806" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2021-52966" }, { "date": "2020-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "date": "2020-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "date": "2020-04-21T16:15:51.337000", "db": "NVD", "id": "CVE-2017-18806" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "CNVD", "id": "CNVD-2021-52966" }, { "date": "2020-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014893" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1835" }, { "date": "2024-11-21T03:20:58.387000", "db": "NVD", "id": "CVE-2017-18806" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Injection vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1835" } ], "trust": 0.6 } }
var-202004-1530
Vulnerability from variot
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1530", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wnd930", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.5" }, { "model": "wn604", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.3.10" }, { "model": "wac510", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac505", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap320", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.5" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.7" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac505", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.3" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" } ] }, "cve": "CVE-2018-21094", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-21094", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016405", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-21094", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cve@mitre.org", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-21094", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-016405", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21094", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2018-21094", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2018-016405", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2173", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-21094", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10", "sources": [ { "db": "NVD", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "VULMON", "id": "CVE-2018-21094" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21094", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-016405", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2173", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-21094", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "id": "VAR-202004-1530", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4320588036363637 }, "last_update_date": "2024-11-23T23:01:24.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for a Security Misconfiguration on Some Wireless Access Points, PSV-2018-0350", "trust": 0.8, "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" }, { "title": "Multiple NETGEAR Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117280" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.netgear.com/000060460/security-advisory-for-a-security-misconfiguration-on-some-wireless-access-points-psv-2018-0350" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21094" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21094" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2018-21094" }, { "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "db": "NVD", "id": "CVE-2018-21094" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2018-21094" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "date": "2020-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "date": "2020-04-27T15:15:12.143000", "db": "NVD", "id": "CVE-2018-21094" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-21094" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016405" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2173" }, { "date": "2024-11-21T04:02:53.217000", "db": "NVD", "id": "CVE-2018-21094" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016405" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2173" } ], "trust": 0.6 } }
var-202004-1532
Vulnerability from variot
Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1532", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wnd930", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.5" }, { "model": "wn604", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.3.10" }, { "model": "wac510", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac505", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap320", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.5" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.7" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac505", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.3" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" } ] }, "cve": "CVE-2018-21096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.4, "id": "CVE-2018-21096", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.9, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016402", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.5, "id": "CVE-2018-21096", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.5, "id": "CVE-2018-21096", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-016402", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21096", "trust": 1.0, "value": "HIGH" }, { "author": "cve@mitre.org", "id": "CVE-2018-21096", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2018-016402", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2185", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-21096", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This affects WAC120 prior to 2.1.7, WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, WND930 prior to 2.1.5, and WN604 prior to 3.3.10", "sources": [ { "db": "NVD", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "VULMON", "id": "CVE-2018-21096" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21096", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-016402", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2185", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-21096", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "id": "VAR-202004-1532", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4320588036363637 }, "last_update_date": "2024-11-23T22:37:24.872000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Cross Site Request Forgery on Some Wireless Access Points, PSV-2018-0096", "trust": 0.8, "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" }, { "title": "Multiple NETGEAR Repair measures for product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117708" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.netgear.com/000060455/security-advisory-for-cross-site-request-forgery-on-some-wireless-access-points-psv-2018-0096" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21096" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21096" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2018-21096" }, { "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "db": "NVD", "id": "CVE-2018-21096" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2018-21096" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "date": "2020-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "date": "2020-04-27T16:15:12.663000", "db": "NVD", "id": "CVE-2018-21096" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-21096" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016402" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2185" }, { "date": "2024-11-21T04:02:53.510000", "db": "NVD", "id": "CVE-2018-21096" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Cross-site request forgery vulnerability in device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016402" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2185" } ], "trust": 0.6 } }
var-202004-1318
Vulnerability from variot
Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1318", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.4" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.2" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.7" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.1.3" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnd930_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014895" } ] }, "cve": "CVE-2017-18805", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-18805", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-014895", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2021-57167", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18805", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "cve@mitre.org", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2017-18805", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-014895", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18805", "trust": 1.0, "value": "MEDIUM" }, { "author": "cve@mitre.org", "id": "CVE-2017-18805", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2017-014895", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-57167", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "NVD", "id": "CVE-2017-18805" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC510, etc. are all a wireless access point (AP) of NETGEAR company. The vulnerability stems from the fact that the network system or product lacks the correct verification of the user input data during the operation process of the user inputting the construction command, data structure or record, and the special elements are not filtered or correctly filtered, resulting in the analysis or analysis of the system or product. The explanation is wrong. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2017-18805" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNVD", "id": "CNVD-2021-57167" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18805", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2017-014895", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-57167", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1815", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "id": "VAR-202004-1318", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" } ], "trust": 1.0737637281818182 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" } ] }, "last_update_date": "2024-11-23T22:33:28.609000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Command Injection Vulnerability on Some Wireless Access Points, PSV-2017-2213", "trust": 0.8, "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" }, { "title": "Patch for NETGEAR command injection vulnerability (CNVD-2021-57167)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/283626" }, { "title": "Multiple NETGEAR Product Command Injection Vulnerability Fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116292" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18805" }, { "trust": 1.6, "url": "https://kb.netgear.com/000049060/security-advisory-for-command-injection-vulnerability-on-some-wireless-access-points-psv-2017-2213" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18805" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-57167" }, { "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "db": "NVD", "id": "CVE-2017-18805" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-30T00:00:00", "db": "CNVD", "id": "CNVD-2021-57167" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "date": "2020-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "date": "2020-04-21T18:15:12.593000", "db": "NVD", "id": "CVE-2017-18805" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2021-57167" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014895" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1815" }, { "date": "2024-11-21T03:20:58.220000", "db": "NVD", "id": "CVE-2017-18805" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Injection vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1815" } ], "trust": 0.6 } }
var-202004-1533
Vulnerability from variot
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5. plural NETGEAR The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all wireless access points (AP) of NETGEAR.
There are buffer overflow vulnerabilities in many NETGEAR products, and remote attackers can use this vulnerability to execute arbitrary code by sending specially crafted requests. This affects WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WAC120 prior to 2.1.7, WN604 prior to 3.3.10, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, and WND930 prior to 2.1.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1533", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wac505", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac120", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wn604", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap320", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap350", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap660", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.7" }, { "model": "wnd930", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.1.5" }, { "model": "wnap210", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wac505", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wac510", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "5.0.5.4" }, { "model": "wn604", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.3.10" }, { "model": "wnap210", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap320", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap350", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap360", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wndap620", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.1.7" }, { "model": "wndap660", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wnap210v2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "3.7.11.4" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.7" }, { "model": "wac120", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.4" }, { "model": "wac505", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "1.3.0.10" }, { "model": "wac510", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "5.0.0.17" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.3" }, { "model": "wn604", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.3.7" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap210", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wnap320", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": null }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wnd930", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.2" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap350", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap360", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.0.11" }, { "model": "wndap620", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "2.1.3" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.5.20.0" }, { "model": "wndap660", "scope": "eq", "trust": 0.1, "vendor": "netgear", "version": "3.7.4.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:wac120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac505_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wac510_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wn604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wnap320_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap350_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap360_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap620_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:wndap660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016403" } ] }, "cve": "CVE-2018-21097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-21097", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-016403", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-28140", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-21097", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cve@mitre.org", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2018-21097", "impactScore": 4.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-016403", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-21097", "trust": 1.0, "value": "CRITICAL" }, { "author": "cve@mitre.org", "id": "CVE-2018-21097", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2018-016403", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-28140", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202004-2187", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2018-21097", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5. plural NETGEAR The device is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR WAC505, etc. are all wireless access points (AP) of NETGEAR. \n\r\n\r\nThere are buffer overflow vulnerabilities in many NETGEAR products, and remote attackers can use this vulnerability to execute arbitrary code by sending specially crafted requests. This affects WAC505 prior to 5.0.5.4, WAC510 prior to 5.0.5.4, WAC120 prior to 2.1.7, WN604 prior to 3.3.10, WNAP320 prior to 3.7.11.4, WNAP210v2 prior to 3.7.11.4, WNDAP350 prior to 3.7.11.4, WNDAP360 prior to 3.7.11.4, WNDAP660 prior to 3.7.11.4, WNDAP620 prior to 2.1.7, and WND930 prior to 2.1.5", "sources": [ { "db": "NVD", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-21097", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2018-016403", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-28140", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-2187", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-21097", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "id": "VAR-202004-1533", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" } ], "trust": 1.065498345 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" } ] }, "last_update_date": "2024-11-23T23:04:24.946000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Pre-Authentication Stack Overflow on Some Wireless Access Points, PSV-2018-0094", "trust": 0.8, "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" }, { "title": "Patch for Multiple NETGEAR product buffer overflow vulnerabilities (CNVD-2020-28140)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/217425" }, { "title": "Multiple NETGEAR Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21097" }, { "trust": 1.7, "url": "https://kb.netgear.com/000060457/security-advisory-for-pre-authentication-stack-overflow-on-some-wireless-access-points-psv-2018-0094" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21097" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-28140" }, { "db": "VULMON", "id": "CVE-2018-21097" }, { "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "db": "NVD", "id": "CVE-2018-21097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-14T00:00:00", "db": "CNVD", "id": "CNVD-2020-28140" }, { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2018-21097" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "date": "2020-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "date": "2020-04-27T16:15:12.710000", "db": "NVD", "id": "CVE-2018-21097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-14T00:00:00", "db": "CNVD", "id": "CNVD-2020-28140" }, { "date": "2020-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-21097" }, { "date": "2020-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016403" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2187" }, { "date": "2024-11-21T04:02:53.660000", "db": "NVD", "id": "CVE-2018-21097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Out-of-bounds write vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016403" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2187" } ], "trust": 0.6 } }
cve-2017-18863
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:44.348Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-28T15:56:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18863", "datePublished": "2020-04-28T15:56:07", "dateReserved": "2020-04-27T00:00:00", "dateUpdated": "2024-08-05T21:37:44.348Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18805
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:43.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-21T17:42:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18805", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18805", "datePublished": "2020-04-21T17:42:08", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T21:37:43.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21094
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:L/C:L/I:L/PR:N/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-27T14:42:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:N/A:L/C:L/I:L/PR:N/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060460/Security-Advisory-for-a-Security-Misconfiguration-on-Some-Wireless-Access-Points-PSV-2018-0350" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21094", "datePublished": "2020-04-27T14:42:14", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21096
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-27T15:56:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060455/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0096" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21096", "datePublished": "2020-04-27T15:56:14", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:H/PR:N/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-27T15:57:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WAC120 before 2.1.7, WN604 before 3.3.10, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, and WND930 before 2.1.5." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:H/PR:N/S:U/UI:R", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060457/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0094" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21097", "datePublished": "2020-04-27T15:57:34", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18806
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:44.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-21T15:56:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000049061/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2214" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18806", "datePublished": "2020-04-21T15:56:41", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T21:37:44.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-21120
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:27.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-22T15:12:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-21120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AC:L/AV:A/A:H/C:N/I:N/PR:L/S:U/UI:R", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-21120", "datePublished": "2020-04-22T15:12:18", "dateReserved": "2020-04-20T00:00:00", "dateUpdated": "2024-08-05T12:19:27.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }