Netgear Nighthawk AC1900 1.0.11.134_10.2.119 wl strncat stack-based overflow

A vulnerability has been found in Netgear Nighthawk AC1900 1.0.11.134_10.2.119 and classified as critical. Affected by this vulnerability is the function strncat of the file wl. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

118

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%26
50%13

Approve Conf

90%26
80%13
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302368809/23/2022VulD...price_0day$5k-$25ksee exploit price documentation09/23/2022accepted
90
1302368709/23/2022VulD...cvss3_meta_tempscore5.3see CVSS documentation09/23/2022accepted
90
1302368609/23/2022VulD...cvss3_meta_basescore5.5see CVSS documentation09/23/2022accepted
90
1302368509/23/2022VulD...cvss3_vuldb_tempscore5.3see CVSS documentation09/23/2022accepted
90
1302368409/23/2022VulD...cvss3_vuldb_basescore5.5see CVSS documentation09/23/2022accepted
90
1302368309/23/2022VulD...cvss2_vuldb_tempscore4.9see CVSS documentation09/23/2022accepted
90
1302368209/23/2022VulD...cvss2_vuldb_basescore5.2see CVSS documentation09/23/2022accepted
90
1302368109/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302368009/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302367909/23/2022VulD...cvss3_vuldb_prLderived from historical data09/23/2022accepted
80
1302367809/23/2022VulD...cvss3_vuldb_avAderived from historical data09/23/2022accepted
80
1302367709/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302367609/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302367509/23/2022VulD...cvss2_vuldb_auSderived from historical data09/23/2022accepted
80
1302367409/23/2022VulD...cvss2_vuldb_avAderived from historical data09/23/2022accepted
80
1302367309/23/2022VulD...cvss2_vuldb_rcURderived from vuldb v3 vector09/23/2022accepted
80
1302367209/23/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector09/23/2022accepted
80
1302367109/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302367009/23/2022VulD...cvss2_vuldb_ciPderived from vuldb v3 vector09/23/2022accepted
80
1302366909/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80

19 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!