Netgear Nighthawk AC1900 1.0.11.134_10.2.119 Firmware wl strncpy stack-based overflow

A vulnerability classified as critical was found in Netgear Nighthawk AC1900 1.0.11.134_10.2.119. This vulnerability affects the function strncpy of the file wl of the component Firmware. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

119

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%27
50%13

Approve Conf

90%27
80%13
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302357109/23/2022VulD...price_0day$5k-$25ksee exploit price documentation09/23/2022accepted
90
1302357009/23/2022VulD...cvss3_meta_tempscore7.7see CVSS documentation09/23/2022accepted
90
1302356909/23/2022VulD...cvss3_meta_basescore8.0see CVSS documentation09/23/2022accepted
90
1302356809/23/2022VulD...cvss3_vuldb_tempscore7.7see CVSS documentation09/23/2022accepted
90
1302356709/23/2022VulD...cvss3_vuldb_basescore8.0see CVSS documentation09/23/2022accepted
90
1302356609/23/2022VulD...cvss2_vuldb_tempscore7.3see CVSS documentation09/23/2022accepted
90
1302356509/23/2022VulD...cvss2_vuldb_basescore7.7see CVSS documentation09/23/2022accepted
90
1302356409/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302356309/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302356209/23/2022VulD...cvss3_vuldb_prLderived from historical data09/23/2022accepted
80
1302356109/23/2022VulD...cvss3_vuldb_avAderived from historical data09/23/2022accepted
80
1302356009/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302355909/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302355809/23/2022VulD...cvss2_vuldb_auSderived from historical data09/23/2022accepted
80
1302355709/23/2022VulD...cvss2_vuldb_avAderived from historical data09/23/2022accepted
80
1302355609/23/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector09/23/2022accepted
80
1302355509/23/2022VulD...cvss2_vuldb_aiCderived from vuldb v3 vector09/23/2022accepted
80
1302355409/23/2022VulD...cvss2_vuldb_iiCderived from vuldb v3 vector09/23/2022accepted
80
1302355309/23/2022VulD...cvss2_vuldb_ciCderived from vuldb v3 vector09/23/2022accepted
80
1302355209/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80

20 more entries are not shown

Do you know our Splunk app?

Download it now for free!