Netgear N300 1.0.0.70 uhttpd strcpy stack-based overflow

A vulnerability, which was classified as critical, was found in Netgear N300 1.0.0.70. Affected is the function strcpy of the component uhttpd. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

119

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%27
50%12

Approve Conf

90%27
80%12
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302364909/23/2022VulD...price_0day$5k-$25ksee exploit price documentation09/23/2022accepted
90
1302364809/23/2022VulD...cvss3_meta_tempscore6.1see CVSS documentation09/23/2022accepted
90
1302364709/23/2022VulD...cvss3_meta_basescore6.3see CVSS documentation09/23/2022accepted
90
1302364609/23/2022VulD...cvss3_vuldb_tempscore6.1see CVSS documentation09/23/2022accepted
90
1302364509/23/2022VulD...cvss3_vuldb_basescore6.3see CVSS documentation09/23/2022accepted
90
1302364409/23/2022VulD...cvss2_vuldb_tempscore6.2see CVSS documentation09/23/2022accepted
90
1302364309/23/2022VulD...cvss2_vuldb_basescore6.5see CVSS documentation09/23/2022accepted
90
1302364209/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302364109/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302364009/23/2022VulD...cvss3_vuldb_prLderived from historical data09/23/2022accepted
80
1302363909/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302363809/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302363709/23/2022VulD...cvss2_vuldb_auSderived from historical data09/23/2022accepted
80
1302363609/23/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector09/23/2022accepted
80
1302363509/23/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector09/23/2022accepted
80
1302363409/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302363309/23/2022VulD...cvss2_vuldb_ciPderived from vuldb v3 vector09/23/2022accepted
80
1302363209/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80
1302363109/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/23/2022accepted
80
1302363009/23/2022VulD...date1663884000 (09/23/2022)09/23/2022accepted
90

19 more entries are not shown

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!