cve-2021-33514
Vulnerability from cvelistv5
Published
2021-05-21 22:10
Modified
2024-08-03 23:50
Summary
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:50:42.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027 with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-21T22:10:04",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-33514",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027 with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071",
              "refsource": "MISC",
              "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071"
            },
            {
              "name": "https://gynvael.coldwind.pl/?lang=en\u0026id=733",
              "refsource": "MISC",
              "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-33514",
    "datePublished": "2021-05-21T22:10:04",
    "dateReserved": "2021-05-21T00:00:00",
    "dateUpdated": "2024-08-03T23:50:42.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-33514\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-05-21T23:15:07.377\",\"lastModified\":\"2024-11-21T06:08:59.750\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027 with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.\"},{\"lang\":\"es\",\"value\":\"Determinados dispositivos NETGEAR est\u00e1n afectados por una inyecci\u00f3n de comandos por un atacante no autenticado por medio de la biblioteca vulnerable /sqfs/lib/libsal.so.0.0 usado por una aplicaci\u00f3n CGI, como es demostrado por setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027\u0026#xa0;con un comando del sistema operativo en el campo User-Agent.\u0026#xa0;Esto afecto a GC108P versiones anteriores a1.0.7.3, GC108PP versiones anteriores a 1.0.7.3, GS108Tv3 versiones anteriores a 7.0.6.3, GS110TPPv1 versiones anteriores a 7.0.6.3, GS110TPv3 versiones anteriores a 7.0.6.3, GS110TUPv1 versiones anteriores a 1.0.4.3, GS710TUPv1 versiones anteriores a 1.0.4.3, GS716TP versiones anteriores a 1.0.2.3, GS716TPP versiones anteriores a 1.0.2.3, GS724TPPv1 versiones anteriores a 2.0.4.3, GS724TPv2 versiones anteriores a 2.0.4.3, GS728TPPv2 versiones anteriores a 6.0.6.3, GS728TPv2 versiones anteriores a 6.0.6.3, GS752TPPv1 versiones anteriores a 6.0.6.3, GS752TPv2 versiones anteriores a 6.0.6.3, MS510TXM versiones anteriores a 1.0.2.3, y MS510TXUP versiones anteriores a 1.0.2.3\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.7.3\",\"matchCriteriaId\":\"8C620986-DC5A-41CC-A98B-889A17BC0ACF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E3ADD8-926C-46CD-ABDF-0F7C99879808\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.7.3\",\"matchCriteriaId\":\"8C3F71EB-072D-4B7E-9919-7E55536F6EEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79979EF-D425-4199-BC73-36FB97EA9976\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.0.6.3\",\"matchCriteriaId\":\"8A05E3C7-6428-4450-8583-489AD5D46527\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.0.6.3\",\"matchCriteriaId\":\"3C940AFA-F467-4DC1-8132-606579937978\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs110tpp:v1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0633037A-6C03-4006-BACE-E0892476489D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.0.6.3\",\"matchCriteriaId\":\"4635972F-C455-4A72-9586-D977590156CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DA3649-BC53-496E-A78C-FFA471872B5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.3\",\"matchCriteriaId\":\"D0612883-028F-40CA-A0E8-E3C8450B2A80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs110tup:v1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99672C73-B9EA-4507-8803-9D87F59B9BF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.3\",\"matchCriteriaId\":\"8133024D-0E3D-4E4E-94B3-AFD03E352592\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs710tup:v1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53C87DD8-98AF-4D2E-8BD8-5F0DE771EB6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.3\",\"matchCriteriaId\":\"D3DF66B6-AF7B-4504-808E-1F714E727702\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.3\",\"matchCriteriaId\":\"52F1C3E3-4B6B-4B28-A7E0-051E14276981\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB3B313-1667-401C-92CF-EBB03CF91010\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0.4.3\",\"matchCriteriaId\":\"FC19F224-54AA-40D4-A105-3C5E673E30A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs724tpp:v1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D5A2DB-7837-4CB4-ADCD-E0890E893E1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0.4.3\",\"matchCriteriaId\":\"B2163D47-4512-43C4-B794-EB98AF1A032F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E871CCB4-8093-44AE-B289-CF81F82A9DB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.6.3\",\"matchCriteriaId\":\"E20C106F-5C99-4CA1-BFB5-4AAAC15ACA42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.6.3\",\"matchCriteriaId\":\"4BE5E6E3-AF0C-44F6-AFC7-78BCFA8B2ABB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126D4F8-2E3C-478B-9BD2-8055DFB48D8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.6.3\",\"matchCriteriaId\":\"DFE86EBE-3C4C-45A2-BDF6-5F8929A88A2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs752tpp:v1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C23B837-890A-4888-B875-94046F846CC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.6.3\",\"matchCriteriaId\":\"27B54BD6-EE51-472D-817F-16CA2DB1541C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD4D404-9A22-408B-89CF-5107B809CB90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.3\",\"matchCriteriaId\":\"B6F0C7DF-8542-4FB2-8081-9A1F77FD7DD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF12A57-ACFA-48AA-B41C-06EB7095C800\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.3\",\"matchCriteriaId\":\"5AC99505-9E3B-4F33-8E97-2F98A817A23B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5\"}]}]}],\"references\":[{\"url\":\"https://gynvael.coldwind.pl/?lang=en\u0026id=733\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gynvael.coldwind.pl/?lang=en\u0026id=733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.