Type Wireless LAN Software

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor »

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector »

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication »

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction »

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume »

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities »

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (391): A1 WLAN Box ADB, Acexy Wireless-N WiFi Repeater, ASUS RT-AX88U, ASUS RT-AX3000, ASUS ZenWiFi AX, BE126 WiFI Repeater, Belkin N150, Belkin N300, Belkin N300 Dual-Band Wi-Fi Range Extender, Belkin N750, Belkin N900, Cisco 2100 Wireless LAN Controller, Cisco 2106 Wireless Lan Controller, Cisco 2504 Wireless Lan Controller, Cisco AireOS, Cisco Aironet, Cisco Aironet 340, Cisco Aironet 1560, Cisco Aironet 1800, Cisco Aironet 1810, Cisco Aironet 1810w, Cisco Aironet 1815, Cisco Aironet 1830, Cisco Aironet 1850, Cisco Aironet 2800, Cisco Aironet 3600 Wireless LAN Controller, Cisco Aironet 3800, Cisco Aironet Access Point, Cisco Aironet Active Sensor, Cisco Aironet AP340, Cisco Aironet AP1200, Cisco Aironet Wireless Access, Cisco Catalyst, Cisco Catalyst 7600 Series Wireless Lan Controller, Cisco Catalyst 9100 Access Point, Cisco Cisco 4200 Wireless Lan Controller, Cisco Cisco Small Business 300 Series Wireless Access Point, Cisco Small Business 100 Series Wireless Access Point, Cisco Small Business 500 Wireless Access Point, Cisco Wireless Access Point, Cisco Wireless LAN Controller, Cisco Wireless LAN Controller Software, Cisco Wireless LAN Solution Engine, CMG Openwave WAP Gateway, CMG WAP Gateway, Comcast XFINITY WiFi Home Hotspot, D-Link Central WiFiManager CWM-100, D-Link Central WiFi Manager, D-Link Central WiFi Manager CWM(100), Dell Truemobile 1300 Wlan Mini-pci Card Util Trayapplet, DEPSTECH WiFi Digital Microscope, EE 4GEE WiFi MBB, eEye Retina WiFi Scanner, Emobile Pocket Wifi, EPON CPE-WiFi, Fortinet FortiAP, Fortinet FortiAP-S-W2, Fortinet FortiAP-S W2, Fortinet FortiAP-U, FruityWifi, Hak5 WiFi Pineapple, Hak5 WiFi Pineapple Mark VII, Huawei E355s Mobile WiFi, Huawei E587 Mobile WiFi, Intel PROSet, Intel PROSet-Wireless WiFi, Intel PROSet Wireless WiFi Software, Intel Wireless LAN, Intel Wireless WiFi, Intermec WAP, Jinan USR IOT USR-WIFI232 Low Power WiFi Module, KERUI Wifi Endoscope Camera YPC99, KPN Experia WiFi, Macally WIFISD2-2A82, MadWifi, Madwifi, myStrom WiFi Bulb, myStrom WiFi Button, myStrom WiFi Button Plus, myStrom WiFi LED Strip, myStrom WiFi Switch, myStrom WiFi Switch EU, myStrom WiFi Switch V1, N-Tron 702-W Industrial Wireless Access Point, Netgear , Netgear 2CXNAS, Netgear AC2100, Netgear AC2400, Netgear AC2600, Netgear AC3000, Netgear and XR300, Netgear CBK40, Netgear CBR40, Netgear D500, Netgear D1500, Netgear D3600, Netgear D6000, Netgear D6100, Netgear D6200, Netgear D6220, Netgear D6300B, Netgear D6400, Netgear D7000, Netgear D7000v2, Netgear D7800, Netgear D8500, Netgear DC112A, Netgear DG632, NETGEAR DG834GT, Netgear DGN1000, Netgear DGN1000B, Netgear DGN2200, Netgear DGN2200B, Netgear DGN2200Bv4, Netgear DGN2200v1, Netgear DGN2200v4, Netgear DGN2200 N300, Netgear DGND2200Bv4, Netgear DGND3300v2, Netgear DGND3700, Netgear DIR-100, Netgear DM200, Netgear EAX20, Netgear EAX80, Netgear EX2700, Netgear EX3110, Netgear EX3700, Netgear EX3800, Netgear EX3920, Netgear EX6000, Netgear EX6100, Netgear EX6100v2, Netgear EX6110, Netgear EX6120, Netgear EX6130, Netgear EX6150, Netgear EX6150v1, Netgear EX6150v2, Netgear EX6200, Netgear EX6200v1, Netgear EX6200v2, Netgear EX6250, Netgear EX6400, Netgear EX6400v2, Netgear EX6410, Netgear EX6920, Netgear EX7000, Netgear EX7300, Netgear EX7300v2, Netgear EX7320, Netgear EX7500, Netgear EX7700, Netgear EX8000, Netgear JNDR3000, Netgear JNR1010v2, Netgear JNR3210, Netgear JR6150, Netgear JWNR2010v5, Netgear LG2200D, Netgear MK60, Netgear MK62, Netgear MR60, Netgear MS60, Netgear Nighthawk AC2100, Netgear Nighthawk AC2400, Netgear PR2000, Netgear R300, Netgear R2000, Netgear R4500, Netgear R6020, Netgear R6050, Netgear R6080, Netgear R6100, Netgear R6120, Netgear R6200, Netgear R6200V2, Netgear R6220, Netgear R6230, Netgear R6250, Netgear R6260, Netgear R6300, Netgear R6300v2, Netgear R6330, Netgear R6350, Netgear R6400, Netgear R6400v1, Netgear R6400v2, Netgear R6700, Netgear R6700v1, Netgear R6700v2, Netgear R6700v3, Netgear R6800, Netgear R6850, Netgear R6900, Netgear R6900P, Netgear R6900v2, Netgear R7000, Netgear R7000P, Netgear R7100LG, Netgear R7200, Netgear R7300, Netgear R7300DST, Netgear R7350, Netgear R7400, Netgear R7450, Netgear R7500, Netgear R7500v2, Netgear R7800, Netgear R7850, Netgear R7900, Netgear R7900P, Netgear R7960P, Netgear R8000, Netgear R8000P, Netgear R8300, Netgear R8500, Netgear R8900, Netgear R9000, Netgear R69002, NETGEAR RAIDiator, Netgear RAX15, Netgear RAX20, Netgear RAX35, Netgear RAX38, Netgear RAX40, Netgear RAX45, Netgear RAX50, Netgear RAX75, Netgear RAX80, Netgear RAX120, Netgear RAX200, Netgear RBK12, Netgear RBK13, Netgear RBK14, Netgear RBK15, Netgear RBK20, Netgear RBK22, Netgear RBK23, Netgear RBK40, Netgear RBK50, Netgear RBK50V, Netgear RBK752, Netgear RBK753, Netgear RBK753S, Netgear RBK754, Netgear RBK842, Netgear RBK852, Netgear RBK853, Netgear RBK854, Netgear RBR10, Netgear RBR20, Netgear RBR40, Netgear RBR50, Netgear RBR750, Netgear RBR752, Netgear RBR753, Netgear RBR753S, Netgear RBR754, Netgear RBR840, Netgear RBR850, Netgear RBS10, Netgear RBS20, Netgear RBS40, Netgear RBS40V, Netgear RBS40V-200, Netgear RBS50, Netgear RBS50Y, Netgear RBS750, Netgear RBS840, Netgear RBS850, Netgear RBW30, Netgear ReadyNAS, NETGEAR ReadyNAS RAIDiator, Netgear ReadyNAS Surveillance, Netgear RM-356, Netgear RN42400, Netgear RP114, Netgear RS400, Netgear RT-338, Netgear RT311, Netgear RT314, Netgear SRK60, Netgear SRR60, Netgear SRS60, Netgear WAC104, Netgear WAC120, Netgear WAC505, Netgear WAC510, Netgear WAC720, Netgear WAC730, Netgear WAC740, Netgear WC7500, Netgear WC7520, Netgear WC7600, Netgear WC7600v1, Netgear WC7600v2, Netgear WC9500, NetGear WG311v1, NetGear WG602, Netgear WG602, Netgear WGR614, Netgear WGR614v10, NETGEAR WGT624, Netgear WN604, Netgear WN802Tv2, Netgear WN2000RPT, Netgear WN2000RPTv3, Netgear WN2500RPv2, Netgear WN3000RPv2, Netgear WN3000RPv3, Netgear WN3100RP, Netgear WN3100RPv2, Netgear WN3500RP, Netgear WN3500RPv1, Netgear WNAP210, Netgear WNAP210v2, Netgear WNAP320, Netgear WND930, Netgear Wndap330, Netgear WNDAP350, Netgear WNDAP360, Netgear WNDAP620, Netgear WNDAP660, Netgear WNDR3400v2, Netgear WNDR3400v3, Netgear WNDR3700v3, Netgear WNDR3700v4, Netgear WNDR3700v5, Netgear WNDR4000, Netgear WNDR4300, Netgear WNDR4300v1, Netgear WNDR4300v2, Netgear WNDR4500, Netgear WNDR4500v2, Netgear WNDR4500v3, Netgear WNDR4700, Netgear WNR614, Netgear WNR1000, Netgear WNR1000v3, Netgear WNR1000V4, Netgear WNR1000v4, Netgear WNR2000, Netgear WNR2000v2, Netgear WNR2000v3, Netgear WNR2000v4, Netgear WNR2000v5, Netgear WNR2000v5 (R2000), Netgear WNR2010v5, Netgear WNR2020, Netgear WNR2050, Netgear WNR3500L, Netgear WNR3500Lv2, Netgear WNR3500U, Netgear WPN824v3, Netgear XR300, Netgear XR450, Netgear XR500, Netgear XR700, Netgear XR300, Nortel WLAN Access Point, Papenmeier WiFi Baby Monitor Free, Papenmeier WiFi Baby Monitor Lite, Philips IntelliVue WLAN, Photos in Wifi application, Sangfor Sundray WLAN Controller, Sannce Smart HD Wifi Security Camera EAN 2, SavySoda WiFi Free Hd, Siemens 3568i WAP, Siemens Gigaset WLAN Camera, SO Connect SO WIFI Hotspot Web Interface, Summer Baby Zoom Wifi Monitor , Summer Internet Viewing System, thingsSDK WiFi Scanner, TP-LINK ER, TP-LINK WAR, TP-LINK WVR, TRENDnet WiFi Baby Cam TV-IP743SIC, T&W WIFI Repeater BE126, U.S. Robotics USR808054 Wireless Access Point, VelotiSmart WiFi B-380 Camera, Visavi Wap-Motor, Wap Portal Server, Wap Portal Serve, Wap Portal Server, Wi-Fi Wifi Protected Setup Protocol, Wifi-soft UniBox, Wifi-soft UniBox controller, WiFiRanger, Xiaomi MIWiFi Xiaomi_55DD, Xiaomi Mi WiFi R3G, ZyXEL P2000W Wifi Phone

PublishedBaseTempVulnerabilityProdExpRemCTICVE
09/23/20216.96.8Cisco Aironet Access Point WLAN Control Protocol memory leakAironet Access PointNot DefinedOfficial Fix1.09-CVE-2021-34740
09/22/20218.18.1Netgear RS400 Circle Parental Control Service cleartext transmissionR6400v2/R6700/R6700v3/R6900/R6900P/R7000/R7000P/R7850/R7900/R8000/RS400Not DefinedNot Defined0.75CVE-2021-40847
09/18/20214.74.7Netgear R6020 setup.cgi os command injectionR6020Not DefinedNot Defined0.03CVE-2021-41383
09/02/20218.88.8KPN Experia WiFi Syslog Configuration Form input validationExperia WiFiNot DefinedNot Defined0.00CVE-2021-38703
08/11/20214.34.1Netgear XR500 cross site scriptingD7800/R7800/R8900/R9000/RAX120/RBK20/RBR20/RBS20/RBK40/RBR40/RBS40/RBK50/RBR50/RBS50/XR500Not DefinedOfficial Fix0.00CVE-2021-38538
08/11/20212.42.3Netgear RAX40 cross site scriptingD6200/D7000/R6020/R6080/R6120/R6260/R6700v2/R6800/R6900v2/R6850/R7200/R7350/R7400/R7450/AC2100/AC2400/AC2600/RAX40Not DefinedOfficial Fix0.00CVE-2021-38537
08/11/20212.42.3Netgear RAX40 cross site scriptingD6200/D7000/R6020/R6080/R6120/R6260/R6700v2/R6800/R6900v2/R6850/R7200/R7350/R7400/R7450/AC2100/AC2400/AC2600/RAX35/RAX40Not DefinedOfficial Fix0.04CVE-2021-38536
08/11/20212.42.3Netgear RAX40 cross site scriptingD6200/D7000/R6020/R6080/R6120/R6260/R6700v2/R6800/R6900v2/R6850/R7200/R7350/R7400/R7450/AC2100/AC2400/AC2600/RAX35/RAX40Not DefinedOfficial Fix0.04CVE-2021-38535
08/11/20212.42.3Netgear XR500 cross site scriptingD3600/D6000/D6100/D6200/D6220/D6400/D7000/D7000v2/D8500/DC112A/DGN2200v4/DGND2200Bv4/DM200/JR6150/PR2000/R6020/R6050/R6080/R6220/R6230/R6250/R6260/R6300v2/R6400/R6400v2/R6700/R6700v2/R6700v3/R6800/R6900/R6900P/R6900v2/R7000/R7000P/R7100LG/R7300DST/R7450/R7900/R7900P/R8000/R8000P/R8300/R8500/WNDR3400v3/WNR2020/WNR3500Lv2/XR450/XR500Not DefinedOfficial Fix0.00CVE-2021-38534
08/11/20213.53.4Netgear RAX40 cross site scriptingRAX40Not DefinedOfficial Fix0.00CVE-2021-38533
08/11/20215.55.3Netgear R8500 access controlD8500/R6400v2/R6700/R6700v3/R6900/R6900P/R7000/R7000P/R7100LG/R7300DST/R7900/R8300/R8500Not DefinedOfficial Fix0.00CVE-2021-38539
08/11/20216.86.5Netgear WAC104 configWAC104Not DefinedOfficial Fix0.00CVE-2021-38532
08/11/20214.13.9Netgear AC2400 configD6200/D7000/R6020/R6080/R6120/R6260/R6700v2/R6800/R6900v2/R7450/AC2100/AC2400Not DefinedOfficial Fix0.04CVE-2021-38531
08/11/20218.88.4Netgear RBK40 command injectionRBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBS50YNot DefinedOfficial Fix0.03CVE-2021-38530
08/11/20216.36.0Netgear D7800/R7800/R8900/R9000 command injectionD7800/R7800/R8900/R9000Not DefinedOfficial Fix0.03CVE-2021-38529
08/11/20218.88.4Netgear D8500/R6900P/R7000P/R7100LG/WNDR3400v3/XR300 command injectionD8500/R6900P/R7000P/R7100LG/WNDR3400v3/XR300Not DefinedOfficial Fix0.04CVE-2021-38528
08/11/20214.34.1Netgear RAX35/RAX38/RAX40 buffer overflowRAX35/RAX38/RAX40Not DefinedOfficial Fix0.00CVE-2021-38526
08/11/20216.86.5Netgear XR500 stack-based overflowD3600/D6000/D6200/D7000/EX6200v2/EX7000/EX8000/JR6150/PR2000/R6020/R6050/R6080/R6120/R6220/R6260/R6300v2/R6700/R6700v2/R6800/R6900/R6900P/R6900v2/R7000/R7000P/R7800/R8900/R9000/XR500Not DefinedOfficial Fix0.04CVE-2021-38525
08/11/20214.34.1Netgear R6400 stack-based overflowR6400Not DefinedOfficial Fix0.04CVE-2021-38523
08/11/20216.86.5Netgear R6400 stack-based overflowR6400Not DefinedOfficial Fix0.03CVE-2021-38522
08/11/20214.74.5Netgear R6400/R7900P/R8000P/RAX75/RAX80 command injectionR6400/R7900P/R8000P/RAX75/RAX80Not DefinedOfficial Fix0.00CVE-2021-38521
08/11/20216.66.3Netgear R6400/R6400v2/R6700v3/R6700v2/R6900v2/R7000P command injectionR6400/R6400v2/R6700v3/R6700v2/R6900v2/R7000PNot DefinedOfficial Fix0.00CVE-2021-38520
08/11/20214.74.5Netgear RAX80 command injectionR6250/R6300v2/R6400/R6400v2/R6700v3/R6700/R6900/R7000/R6900P/R7100LG/R7900/R8000/R7900P/R8000P/RAX80Not DefinedOfficial Fix0.04CVE-2021-38519
08/11/20216.86.5Netgear RAX200/RAX75/RAX80/RBK852/RBR850/RBS850 command injectionRAX200/RAX75/RAX80/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.00CVE-2021-38518
08/11/20214.34.1Netgear R6400/RAX75/RAX80/XR300 out-of-bounds writeR6400/RAX75/RAX80/XR300Not DefinedOfficial Fix0.03CVE-2021-38517

Do you need the next level of professionalism?

Upgrade your account now!