Lucene search

K

Netgear Router Security Vulnerabilities

cve
cve

CVE-2023-28338

Any request send to a Netgear Nighthawk Wifi6 Router (RAX30)'s web service containing a “Content-Type” of “multipartboundary=” will result in the request body being written to “/tmp/mulipartFile” on the device itself. A sufficiently large file will cause device resources to be exhausted, resulting....

7.5CVSS

7.4AI Score

0.001EPSS

2023-03-15 11:15 PM
28
cve
cve

CVE-2023-28337

When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the...

8.8CVSS

8.6AI Score

0.001EPSS

2023-03-15 11:15 PM
27
cve
cve

CVE-2023-27853

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a format string vulnerability in a SOAP service that could allow an attacker to execute arbitrary code on the...

9.8CVSS

9.6AI Score

0.002EPSS

2023-03-10 06:15 PM
42
cve
cve

CVE-2023-27852

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerability in various CGI mechanisms that could allow an attacker to execute arbitrary code on the...

9.8CVSS

9.7AI Score

0.003EPSS

2023-03-10 06:15 PM
26
cve
cve

CVE-2023-27851

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that unintentionally allows users with upload permissions to execute arbitrary code on the...

8.8CVSS

8.9AI Score

0.001EPSS

2023-03-10 06:15 PM
19
cve
cve

CVE-2023-1205

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 is vulnerable to cross-site request forgery attacks on all endpoints due to improperly implemented CSRF...

8.8CVSS

8.6AI Score

0.001EPSS

2023-03-10 06:15 PM
24
cve
cve

CVE-2023-27850

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that allows users with access to this feature to access arbitrary files on the...

6.8CVSS

6.6AI Score

0.001EPSS

2023-03-10 06:15 PM
21
cve
cve

CVE-2022-47210

The default console presented to users over telnet (when enabled) is restricted to a subset of commands. Commands issued at this console, however, appear to be fed directly into a system call or other similar function. This allows any authenticated user to execute arbitrary commands on the...

7.8CVSS

7.7AI Score

0.0004EPSS

2022-12-16 08:15 PM
27
cve
cve

CVE-2022-47208

The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without...

8.8CVSS

9.2AI Score

0.0004EPSS

2022-12-16 08:15 PM
23
cve
cve

CVE-2022-47209

A support user exists on the device and appears to be a backdoor for Technical Support staff. The default password for this account is “support” and cannot be changed by a user via any normally accessible...

8.8CVSS

8.6AI Score

0.001EPSS

2022-12-16 08:15 PM
23
cve
cve

CVE-2021-20166

Netgear RAX43 version 1.0.3.96 contains a buffer overrun vulnerability. The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the...

8.8CVSS

8.8AI Score

0.005EPSS

2021-12-30 10:15 PM
26
In Wild
cve
cve

CVE-2006-1068

Netgear 614 and 624 routers, possibly running VXWorks, allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a...

7.1AI Score

0.03EPSS

2006-03-07 10:06 PM
14