Type Wireless LAN Software

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor »

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector »

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication »

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction »

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume »

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities »

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (322): A1 WLAN Box ADB, BE126 WiFI Repeater, Belkin N150, Belkin N300, Belkin N300 Dual-Band Wi-Fi Range Extender, Belkin N750, Belkin N900, Cisco 2100 Wireless LAN Controller, Cisco 2106 Wireless Lan Controller, Cisco 2504 Wireless Lan Controller, Cisco AireOS, Cisco Aironet, Cisco Aironet 340, Cisco Aironet 1560, Cisco Aironet 1800, Cisco Aironet 1810, Cisco Aironet 1810w, Cisco Aironet 1815, Cisco Aironet 1830, Cisco Aironet 1850, Cisco Aironet 2800, Cisco Aironet 3600 Wireless LAN Controller, Cisco Aironet 3800, Cisco Aironet Access Point, Cisco Aironet Active Sensor, Cisco Aironet AP340, Cisco Aironet AP1200, Cisco Aironet Wireless Access, Cisco Catalyst 7600 Series Wireless Lan Controller, Cisco Catalyst 9100 Access Point, Cisco Cisco 4200 Wireless Lan Controller, Cisco Cisco Small Business 300 Series Wireless Access Point, Cisco Small Business 100 Series Wireless Access Point, Cisco Small Business 500 Wireless Access Point, Cisco Wireless Access Point, Cisco Wireless LAN Controller, Cisco Wireless LAN Controller Software, Cisco Wireless LAN Solution Engine, CMG Openwave WAP Gateway, CMG WAP Gateway, Comcast XFINITY WiFi Home Hotspot, D-Link Central WiFiManager CWM-100, D-Link Central WiFi Manager, D-Link Central WiFi Manager CWM(100), Dell Truemobile 1300 Wlan Mini-pci Card Util Trayapplet, EE 4GEE WiFi MBB, eEye Retina WiFi Scanner, Emobile Pocket Wifi, EPON CPE-WiFi, Fortinet FortiAP, Fortinet FortiAP-S-W2, Fortinet FortiAP-S W2, Fortinet FortiAP-U, FruityWifi, Hak5 WiFi Pineapple, Hak5 WiFi Pineapple Mark VII, Huawei E355s Mobile WiFi, Huawei E587 Mobile WiFi, Intel PROSet, Intel PROSet-Wireless WiFi, Intel PROSet Wireless WiFi Software, Intel Wireless LAN, Intel Wireless WiFi, Intermec WAP, Jinan USR IOT USR-WIFI232 Low Power WiFi Module, KERUI Wifi Endoscope Camera YPC99, MadWifi, Madwifi, myStrom WiFi Bulb, myStrom WiFi Button, myStrom WiFi Button Plus, myStrom WiFi LED Strip, myStrom WiFi Switch, myStrom WiFi Switch EU, myStrom WiFi Switch V1, N-Tron 702-W Industrial Wireless Access Point, Netgear , Netgear 2CXNAS, Netgear AC2100, Netgear AC2400, Netgear AC2600, Netgear AC3000, Netgear CBR40, Netgear D500, Netgear D1500, Netgear D3600, Netgear D6000, Netgear D6100, Netgear D6200, Netgear D6220, Netgear D6300B, Netgear D6400, Netgear D7000, Netgear D7000v2, Netgear D7800, Netgear D8500, Netgear DC112A, Netgear DG632, NETGEAR DG834GT, Netgear DGN1000, Netgear DGN1000B, Netgear DGN2200, Netgear DGN2200B, Netgear DGN2200Bv4, Netgear DGN2200v1, Netgear DGN2200v4, Netgear DGN2200 N300, Netgear DGND2200Bv4, Netgear DGND3300v2, Netgear DGND3700, Netgear DIR-100, Netgear EX2700, Netgear EX3700, Netgear EX3800, Netgear EX6000, Netgear EX6100, Netgear EX6100v2, Netgear EX6120, Netgear EX6130, Netgear EX6150, Netgear EX6150v1, Netgear EX6150v2, Netgear EX6200, Netgear EX6200v2, Netgear EX6400, Netgear EX7000, Netgear EX7300, Netgear EX7500, Netgear EX8000, Netgear JNDR3000, Netgear JNR1010v2, Netgear JNR3210, Netgear JR6150, Netgear JWNR2010v5, Netgear LG2200D, Netgear PR2000, Netgear R300, Netgear R2000, Netgear R4500, Netgear R6020, Netgear R6050, Netgear R6080, Netgear R6100, Netgear R6120, Netgear R6200, Netgear R6200V2, Netgear R6220, Netgear R6230, Netgear R6250, Netgear R6260, Netgear R6300, Netgear R6300v2, Netgear R6350, Netgear R6400, Netgear R6400v2, Netgear R6700, Netgear R6700v2, Netgear R6700v3, Netgear R6800, Netgear R6850, Netgear R6900, Netgear R6900P, Netgear R6900v2, Netgear R7000, Netgear R7000P, Netgear R7100LG, Netgear R7300, Netgear R7300DST, Netgear R7450, Netgear R7500, Netgear R7500v2, Netgear R7800, Netgear R7850, Netgear R7900, Netgear R7900P, Netgear R8000, Netgear R8000P, Netgear R8300, Netgear R8500, Netgear R8900, Netgear R9000, Netgear R69002, NETGEAR RAIDiator, Netgear RAX20, Netgear RAX40, Netgear RAX80, Netgear RAX120, Netgear RBK20, Netgear RBK40, Netgear RBK50, Netgear RBK752, Netgear RBK753, Netgear RBK753S, Netgear RBK842, Netgear RBK852, Netgear RBK853, Netgear RBR20, Netgear RBR40, Netgear RBR50, Netgear RBR750, Netgear RBR840, Netgear RBR850, Netgear RBS20, Netgear RBS40, Netgear RBS50, Netgear RBS50Y, Netgear RBS750, Netgear RBS840, Netgear RBS850, Netgear RBW30, Netgear ReadyNAS, NETGEAR ReadyNAS RAIDiator, Netgear ReadyNAS Surveillance, Netgear RM-356, Netgear RN42400, Netgear RP114, Netgear RS400, Netgear RT-338, Netgear RT311, Netgear RT314, Netgear SRK60, Netgear SRR60, Netgear SRS60, Netgear WAC120, Netgear WAC505, Netgear WAC510, Netgear WAC720, Netgear WAC730, Netgear WAC740, Netgear WC7500, Netgear WC7520, Netgear WC7600, Netgear WC7600v1, Netgear WC7600v2, Netgear WC9500, NetGear WG311v1, Netgear WG602, NetGear WG602, Netgear WGR614, Netgear WGR614v10, NETGEAR WGT624, Netgear WN604, Netgear WN802Tv2, Netgear WN2000RPT, Netgear WN2000RPTv3, Netgear WN2500RPv2, Netgear WN3000RPv2, Netgear WN3000RPv3, Netgear WN3100RP, Netgear WN3100RPv2, Netgear WNAP210, Netgear WNAP210v2, Netgear WNAP320, Netgear WND930, Netgear Wndap330, Netgear WNDAP350, Netgear WNDAP360, Netgear WNDAP620, Netgear WNDAP660, Netgear WNDR3400v2, Netgear WNDR3400v3, Netgear WNDR3700v3, Netgear WNDR3700v4, Netgear WNDR3700v5, Netgear WNDR4000, Netgear WNDR4300, Netgear WNDR4300v1, Netgear WNDR4300v2, Netgear WNDR4500, Netgear WNDR4500v2, Netgear WNDR4500v3, Netgear WNDR4700, Netgear WNR614, Netgear WNR1000, Netgear WNR1000v3, Netgear WNR1000v4, Netgear WNR1000V4, Netgear WNR2000, Netgear WNR2000v3, Netgear WNR2000v4, Netgear WNR2000v5, Netgear WNR2020, Netgear WNR2050, Netgear WNR3500L, Netgear WNR3500Lv2, Netgear WNR3500U, Netgear WPN824v3, Netgear XR300, Netgear XR450, Netgear XR500, Netgear XR700, Nortel WLAN Access Point, Papenmeier WiFi Baby Monitor Free, Papenmeier WiFi Baby Monitor Lite, Philips IntelliVue WLAN, Photos in Wifi application, Sangfor Sundray WLAN Controller, SavySoda WiFi Free Hd, Siemens 3568i WAP, Siemens Gigaset WLAN Camera, SO Connect SO WIFI Hotspot Web Interface, Summer Baby Zoom Wifi Monitor , Summer Internet Viewing System, thingsSDK WiFi Scanner, TP-LINK ER, TP-LINK WAR, TP-LINK WVR, TRENDnet WiFi Baby Cam TV-IP743SIC, T&W WIFI Repeater BE126, U.S. Robotics USR808054 Wireless Access Point, VelotiSmart WiFi B-380 Camera, Visavi Wap-Motor, Wap Portal Server, Wap Portal Serve, Wap Portal Server, Wi-Fi Wifi Protected Setup Protocol, Wifi-soft UniBox, Wifi-soft UniBox controller, WiFiRanger, Xiaomi MIWiFi Xiaomi_55DD, Xiaomi Mi WiFi R3G, ZyXEL P2000W Wifi Phone

PublishedBaseTempVulnerabilityProdExpRemCTICVE
11/23/20203.33.3Intel PROSet/Wireless WiFi out-of-bounds writePROSet/Wireless WiFiNot DefinedNot Defined0.05CVE-2020-0569
11/14/20206.36.3Intel PROSet/Wireless WiFi control flowPROSet/Wireless WiFiNot DefinedOfficial Fix0.07CVE-2020-12313
11/12/20204.34.1Intel PROSet/Wireless WiFi Control Flow Management denial of servicePROSet/Wireless WiFiNot DefinedOfficial Fix0.09CVE-2020-12319
11/12/20205.35.1Intel PROSet/Wireless WiFi protection mechanism failurePROSet/Wireless WiFiNot DefinedOfficial Fix0.06CVE-2020-12318
11/12/20204.34.1Intel PROSet/Wireless WiFi denial of servicePROSet/Wireless WiFiNot DefinedOfficial Fix0.05CVE-2020-12314
11/10/20205.55.2Netgear R6250 upnpd buffer overflowR6400v2/R6400/R7000P/R300/R8000/R8300/R8500/R7300DST/R7850/R7900/RAX20/RAX80/R6250Proof-of-ConceptNot Defined0.00CVE-2020-28373
11/05/20207.57.5FruityWifi Metacharacter page_config_adv.php os command injectionFruityWifiNot DefinedNot Defined0.67CVE-2020-24849
10/24/20208.38.3FruityWifi sudo access controlFruityWifiNot DefinedNot Defined0.00CVE-2020-24848
10/24/20204.34.3FruityWifi page_config_adv.php cross-site request forgeryFruityWifiNot DefinedNot Defined0.00CVE-2020-24847
10/14/20205.45.4Netgear R6120/R6080/R6260/R6220/R6020/JNR3210/WNR2020 mini_httpd Service improper authenticationR6120/R6080/R6260/R6220/R6020/JNR3210/WNR2020Not DefinedNot Defined0.06CVE-2020-17409
10/09/20205.04.8Netgear WC7500/WC7600/WC7600v2/WC9500 information disclosureWC7500/WC7600/WC7600v2/WC9500Not DefinedOfficial Fix0.00CVE-2020-26931
10/09/20206.76.4Netgear R6220/R6230 injectionR6220/R6230Not DefinedOfficial Fix0.05CVE-2020-26929
10/09/20206.36.0Netgear CBR40/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 improper authenticationCBR40/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.04CVE-2020-26928
10/09/20208.07.7Netgear WNR2020 improper authenticationD6200/D7000/R6020/R6080/R6050/JR6150/R6120/R6220/R6260/R6700v2/R6800/R6900v2/AC2100/AC2400/AC2600/R7450/WNR2020Not DefinedOfficial Fix0.00CVE-2020-26927
10/09/20205.55.3Netgear CBR40/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 improper authenticationCBR40/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.00CVE-2020-26926
10/09/20205.04.8Netgear WAC720/WAC730 information disclosureWAC720/WAC730Not DefinedOfficial Fix0.06CVE-2020-26924
10/09/20204.14.0Netgear WC7500/WC7600/WC7600v2/WC9500 cross site scriptingWC7500/WC7600/WC7600v2/WC9500Not DefinedOfficial Fix0.06CVE-2020-26923
10/09/20206.15.8Netgear WC7500/WC7600/WC7600v2/WC9500 command injectionWC7500/WC7600/WC7600v2/WC9500Not DefinedOfficial Fix0.00CVE-2020-26922
10/09/20204.14.0Netgear R8500 cross site scriptingEX7000/R6250/R6400/R6400v2/R6700v3/R7100LG/R7300DST/R7900/R8300/R8500Not DefinedOfficial Fix0.00CVE-2020-26918
10/09/20204.14.0Netgear R8500 cross site scriptingEX7000/R6250/R6400/R6400v2/R7100LG/R7300DST/R7900/R8300/R8500Not DefinedOfficial Fix0.00CVE-2020-26917
10/09/20205.95.6Netgear WNR2020 configD6200/D7000/JR6150/R6020/R6050/R6080/R6120/R6220/R6260/R6700v2/R6800/R6900v2/R7450/WNR2020Not DefinedOfficial Fix0.00CVE-2020-26916
10/09/20204.14.0Netgear XR700 cross site scriptingD7800/R7500v2/R7800/R8900/R9000/RAX120/RBK50/RBR50/RBS50/XR500/XR700Not DefinedOfficial Fix0.00CVE-2020-26915
10/09/20206.36.0Netgear WNR2020 command injectionD6200/D7000/JR6150/R6020/R6050/R6080/R6120/R6220/R6260/R6700v2/R6800/R6900v2/R7450/WNR2020Not DefinedOfficial Fix0.18CVE-2020-26914
10/09/20205.55.3Netgear XR500 buffer overflowD6100/R7800/R8900/R9000/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBK40/RBR40/RBS40/SRK60/SRR60/SRS60/WN3000RPv2/WNDR4300v2/WNDR4500v3/WNR2000v5/XR450/XR500Not DefinedOfficial Fix0.05CVE-2020-26913
10/09/20206.15.9Netgear WNR2020 cross-site request forgeryD6200/D7000/JR6150/R6020/R6050/R6080/R6120/R6220/R6260/R6700v2/R6800/R6900v2/R7450/WNR2020Not DefinedOfficial Fix0.05CVE-2020-26912

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!