cve-2023-36187
Vulnerability from cvelistv5
Published
2023-09-01 00:00
Modified
2024-10-01 16:26
Severity ?
EPSS score ?
Summary
Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:41.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r6400v2", "vendor": "netgear", "versions": [ { "lessThan": "1.0.4.118", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36187", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T16:25:37.076547Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T16:26:34.615Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-01T15:04:10.728733", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-36187", "datePublished": "2023-09-01T00:00:00", "dateReserved": "2023-06-21T00:00:00", "dateUpdated": "2024-10-01T16:26:34.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-36187\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-09-01T16:15:08.020\",\"lastModified\":\"2024-11-21T08:09:23.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de desbordamiento de b\u00fafer en NETGEAR R6400v2 antes de la versi\u00f3n 1.0.4.118, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una URL manipulada para httpd. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.5.0.24\",\"matchCriteriaId\":\"7483E92A-5858-49B5-9499-E132941F5ACD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0F7E9E-196C-4106-B1C9-C16FA5910A0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.6.34\",\"matchCriteriaId\":\"BF0F2B55-DBD3-4762-92EA-A01D57277A9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491CEB8D-22F3-4F86-96F0-03C5C58BA295\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.6.122\",\"matchCriteriaId\":\"0A6768BE-C869-4CC5-B683-08B8E4DDD683\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A79475-37BE-47BD-A629-DCEF22500B0B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.6.122\",\"matchCriteriaId\":\"4F6E7187-B191-473D-9E9D-0990447AB8C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65BB3ECD-2F0B-4625-A1DB-F6CEFC46E277\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.6.122\",\"matchCriteriaId\":\"476B2ED6-D7C9-4B84-BCD0-9C98B80A5F53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F003F064-591C-4D7C-9EC4-D0E553BC6683\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rbw30_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.2.6\",\"matchCriteriaId\":\"40DCD126-3E67-4D6E-BD6D-BB84E4FDB344\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rbw30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA73D22-970D-45F2-81F3-9576C04CCC94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.70\",\"matchCriteriaId\":\"CA1BB56F-20B5-4A79-AE9D-429A011EAA4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.118\",\"matchCriteriaId\":\"0095B9D4-E161-4050-B283-2166CB86CB24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.118\",\"matchCriteriaId\":\"0702F9B6-2DAC-4308-8737-9F85AD28E847\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C88DA385-5FAE-49EC-80D6-78F81E7EEC16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.11.130\",\"matchCriteriaId\":\"AB3A588D-46A9-4EFF-8196-46B7A87F1A2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.3.148\",\"matchCriteriaId\":\"5D67D8C3-98DA-4B7D-BA7D-AB5F13E627F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE55F4D-E98B-46D3-B870-041141934CD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.120\",\"matchCriteriaId\":\"6334DE4D-E78B-4582-9C6F-6123DA5192C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.120\",\"matchCriteriaId\":\"BDF9F3BA-4239-4F4D-A65E-A6752A5420F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.120\",\"matchCriteriaId\":\"334BB384-5C29-4D24-9F82-B8EE8D0CA8BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B5A85C-3588-4263-B9AD-4E56D3F6CB16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5.1.86\",\"matchCriteriaId\":\"3BC7E8C9-62BD-45E2-8A7A-D29A6150622A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2700644E-0940-4D05-B3CA-904D91739E58\"}]}]}],\"references\":[{\"url\":\"https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:37:41.263Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-36187\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-01T16:25:37.076547Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*\"], \"vendor\": \"netgear\", \"product\": \"r6400v2\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.0.4.118\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-01T16:26:29.031Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-09-01T15:04:10.728733\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-36187\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-01T16:26:34.615Z\", \"dateReserved\": \"2023-06-21T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-09-01T00:00:00\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.