Wireless LAN Software Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor

Netgear716
Cisco168
TP-LINK25
Intel25
Not Defined19

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product

Netgear R7800187
Netgear R9000167
Netgear RBR850136
Netgear RBS850135
Netgear RBK852133

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix757
Temporary Fix0
Workaround35
Unavailable0
Not Defined269

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High19
Functional6
Proof-of-Concept88
Unproven22
Not Defined926

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical4
Local57
Adjacent502
Network498

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High220
Low277
None564

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required119
None942

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤347
≤420
≤5130
≤6163
≤7284
≤8259
≤989
≤1069

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤347
≤431
≤5151
≤6259
≤7206
≤8221
≤9123
≤1023

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤21
≤3103
≤455
≤5137
≤6225
≤7289
≤8131
≤981
≤1039

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤534
≤669
≤7151
≤8112
≤9136
≤1057

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤44
≤57
≤67
≤729
≤818
≤976
≤1041

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤81
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k15
<2k39
<5k241
<10k211
<25k491
<50k62
<100k2
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k507
<2k145
<5k267
<10k93
<25k49
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (439): A1 WLAN Box ADB, Acexy Wireless-N WiFi Repeater, Asus ASUS ZenWiFi AX, Asus ASUS ZenWiFi XD6, Asus GT-AX11000, Asus RT-AX55, Asus RT-AX56U, Asus RT-AX56U_V2, Asus RT-AX58U, Asus RT-AX82U, Asus RT-AX82U GUNDAM EDITION, Asus RT-AX86S), Asus RT-AX86S, Asus RT-AX86U, Asus RT-AX86U ZAKU II EDITION, Asus RT-AX88U, ASUS RT-AX88U, Asus RT-AX92U, ASUS RT-AX3000, Asus RT-AX3000, Asus TUF-AX5400, Asus TUF Gaming AX3000, ASUS ZenWiFi AX, BE126 WiFI Repeater, Belkin N150, Belkin N300, Belkin N300 Dual-Band Wi-Fi Range Extender, Belkin N750, Belkin N900, Cisco 2100 Wireless LAN Controller, Cisco 2106 Wireless Lan Controller, Cisco 2504 Wireless Lan Controller, Cisco AireOS, Cisco Aironet, Cisco Aironet 340, Cisco Aironet 1560, Cisco Aironet 1800, Cisco Aironet 1810, Cisco Aironet 1810w, Cisco Aironet 1815, Cisco Aironet 1830, Cisco Aironet 1850, Cisco Aironet 2800, Cisco Aironet 3600 Wireless LAN Controller, Cisco Aironet 3800, Cisco Aironet Access Point, Cisco Aironet Active Sensor, Cisco Aironet AP340, Cisco Aironet AP1200, Cisco Aironet Wireless Access, Cisco Catalyst, Cisco Catalyst 7600 Series Wireless Lan Controller, Cisco Catalyst 9100 Access Point, Cisco Cisco 4200 Wireless Lan Controller, Cisco Cisco Small Business 300 Series Wireless Access Point, Cisco Small Business 100 Series Wireless Access Point, Cisco Small Business 500 Wireless Access Point, Cisco Wireless Access Point, Cisco Wireless LAN Controller, Cisco Wireless LAN Controller Software, Cisco Wireless LAN Solution Engine, CMG Openwave WAP Gateway, CMG WAP Gateway, Comcast XFINITY WiFi Home Hotspot, D-Link Central WiFiManager CWM-100, D-Link Central WiFi Manager, D-Link Central WiFi Manager CWM(100), Dell Truemobile 1300 Wlan Mini-pci Card Util Trayapplet, DEPSTECH WiFi Digital Microscope, EE 4GEE WiFi MBB, eEye Retina WiFi Scanner, Emobile Pocket Wifi, EPON CPE-WiFi, Fortinet FortiAP, Fortinet FortiAP-S-W2, Fortinet FortiAP-S W2, Fortinet FortiAP-U, FruityWifi, Hak5 WiFi Pineapple, Hak5 WiFi Pineapple Mark VII, Huawei E355s Mobile WiFi, Huawei E587 Mobile WiFi, Intel Killer WiFi, Intel PROSet, Intel PROSet-Wireless WiFi, Intel PROSet Wireless WiFi Software, Intel Wireless LAN, Intel Wireless WiFi, Intermec WAP, Jinan USR IOT USR-WIFI232 Low Power WiFi Module, KERUI Wifi Endoscope Camera YPC99, KPN Experia WiFi, Macally WIFISD2-2A82, Madwifi, MadWifi, myStrom WiFi Bulb, myStrom WiFi Button, myStrom WiFi Button Plus, myStrom WiFi LED Strip, myStrom WiFi Switch, myStrom WiFi Switch EU, myStrom WiFi Switch V1, N-Tron 702-W Industrial Wireless Access Point, Netgear , Netgear 2CXNAS, Netgear AC2100, Netgear AC2400, Netgear AC2600, Netgear AC3000, Netgear affects R6260, Netgear and XR300, Netgear CBK40, Netgear CBR40, Netgear CBR750, Netgear D500, Netgear D1500, Netgear D3600, Netgear D6000, Netgear D6100, Netgear D6200, Netgear D6220, Netgear D6300B, Netgear D6400, Netgear D7000, Netgear D7000v1, Netgear D7000v2, Netgear D7800, Netgear D8500, Netgear DC112A, Netgear DG632, NETGEAR DG834GT, Netgear DGN1000, Netgear DGN1000B, Netgear DGN2200, Netgear DGN2200B, Netgear DGN2200Bv4, Netgear DGN2200v1, Netgear DGN2200v4, Netgear DGN2200 N300, Netgear DGND2200Bv4, Netgear DGND3300v2, Netgear DGND3700, Netgear DIR-100, Netgear DM200, Netgear EAX20, Netgear EAX80, Netgear EX2700, Netgear EX3110, Netgear EX3700, Netgear EX3800, Netgear EX3920, Netgear EX6000, Netgear EX6100, Netgear EX6100v2, Netgear EX6110, Netgear EX6120, Netgear EX6130, Netgear EX6150, Netgear EX6150v1, Netgear EX6150v2, Netgear EX6200, Netgear EX6200v1, Netgear EX6200v2, Netgear EX6250, Netgear EX6400, Netgear EX6400v2, Netgear EX6410, Netgear EX6420, Netgear EX6920, Netgear EX7000, Netgear EX7300, Netgear EX7300v2, Netgear EX7320, Netgear EX7500, Netgear EX7700, Netgear EX8000, Netgear JNDR3000, Netgear JNR1010v2, Netgear JNR3210, Netgear JR6150, Netgear JWNR2010v5, Netgear LAX20, Netgear LBR20, Netgear LBR1020, Netgear LG2200D, Netgear MK60, Netgear MK62, Netgear MR60, Netgear MR80, Netgear MS60, Netgear MS80, Netgear Nighthawk AC2100, Netgear Nighthawk AC2400, Netgear PR2000, Netgear R300, Netgear R2000, Netgear R4500, Netgear R6020, Netgear R6050, Netgear R6080, Netgear R6100, Netgear R6120, Netgear R6200, Netgear R6200V2, Netgear R6220, Netgear R6230, Netgear R6250, Netgear R6260, Netgear R6300, Netgear R6300v2, Netgear R6330, Netgear R6350, Netgear R6400, Netgear R6400v1, Netgear R6400v2, Netgear R6700, Netgear R6700AX, Netgear R6700v1, Netgear R6700v2, Netgear R6700v3, Netgear R6800, Netgear R6850, Netgear R6900, Netgear R6900P, Netgear R6900v2, Netgear R7000, Netgear R7000P, Netgear R7100LG, Netgear R7200, Netgear R7300, Netgear R7300DST, Netgear R7350, Netgear R7400, Netgear R7450, Netgear R7500, Netgear R7500v2, Netgear R7800, Netgear R7850, Netgear R7900, Netgear R7900P, Netgear R7960P, Netgear R8000, Netgear R8000P, Netgear R8300, Netgear R8500, Netgear R8900, Netgear R9000, Netgear R69002, NETGEAR RAIDiator, Netgear RAX10, Netgear RAX15, Netgear RAX20, Netgear RAX35, Netgear RAX35v2, Netgear RAX38, Netgear RAX40, Netgear RAX40v2, Netgear RAX43, Netgear RAX45, Netgear RAX50, Netgear RAX70, Netgear RAX75, Netgear RAX78, Netgear RAX80, Netgear RAX120, Netgear RAX120v1, Netgear RAX120v2, Netgear RAX200, Netgear RBK12, Netgear RBK13, Netgear RBK14, Netgear RBK15, Netgear RBK20, Netgear RBK22, Netgear RBK23, Netgear RBK40, Netgear RBK50, Netgear RBK50V, Netgear RBK352, Netgear RBK752, Netgear RBK753, Netgear RBK753S, Netgear RBK754, Netgear RBK842, Netgear RBK852, Netgear RBK853, Netgear RBK854, Netgear RBR10, Netgear RBR20, Netgear RBR40, Netgear RBR50, Netgear RBR350, Netgear RBR750, Netgear RBR752, Netgear RBR753, Netgear RBR753S, Netgear RBR754, Netgear RBR840, Netgear RBR850, Netgear RBR852, Netgear RBRE960, Netgear RBS10, Netgear RBS20, Netgear RBS40, Netgear RBS40V, Netgear RBS40V-200, Netgear RBS50, Netgear RBS50Y, Netgear RBS350, Netgear RBS750, Netgear RBS840, Netgear RBS850, Netgear RBSE960, Netgear RBW30, Netgear ReadyNAS, NETGEAR ReadyNAS RAIDiator, Netgear ReadyNAS Surveillance, Netgear RM-356, Netgear RN42400, Netgear RP114, Netgear RS400, Netgear RT-338, Netgear RT311, Netgear RT314, Netgear SRC60, Netgear SRK60, Netgear SRR60, Netgear SRS60, Netgear SXK30, Netgear SXR30, Netgear SXS30, Netgear WAC104, Netgear WAC120, Netgear WAC505, Netgear WAC510, Netgear WAC720, Netgear WAC730, Netgear WAC740, Netgear WC7500, Netgear WC7520, Netgear WC7600, Netgear WC7600v1, Netgear WC7600v2, Netgear WC9500, NetGear WG311v1, NetGear WG602, Netgear WG602, Netgear WGR614, Netgear WGR614v10, NETGEAR WGT624, Netgear WN604, Netgear WN802Tv2, Netgear WN2000RPT, Netgear WN2000RPTv3, Netgear WN2500RPv2, Netgear WN3000RPv2, Netgear WN3000RPv3, Netgear WN3100RP, Netgear WN3100RPv2, Netgear WN3500RP, Netgear WN3500RPv1, Netgear WNAP210, Netgear WNAP210v2, Netgear WNAP320, Netgear WND930, Netgear Wndap330, Netgear WNDAP350, Netgear WNDAP360, Netgear WNDAP620, Netgear WNDAP660, Netgear WNDR3400v2, Netgear WNDR3400v3, Netgear WNDR3700v3, Netgear WNDR3700v4, Netgear WNDR3700v5, Netgear WNDR4000, Netgear WNDR4300, Netgear WNDR4300v1, Netgear WNDR4300v2, Netgear WNDR4500, Netgear WNDR4500v2, Netgear WNDR4500v3, Netgear WNDR4700, Netgear WNR614, Netgear WNR1000, Netgear WNR1000v3, Netgear WNR1000v4, Netgear WNR1000V4, Netgear WNR2000, Netgear WNR2000v2, Netgear WNR2000v3, Netgear WNR2000v4, Netgear WNR2000v5, Netgear WNR2000v5 (R2000), Netgear WNR2010v5, Netgear WNR2020, Netgear WNR2050, Netgear WNR3500L, Netgear WNR3500Lv2, Netgear WNR3500U, Netgear WPN824v3, Netgear XR300, Netgear XR450, Netgear XR500, Netgear XR700, Netgear XR1000, Netgear XR300, Nortel WLAN Access Point, Papenmeier WiFi Baby Monitor Free, Papenmeier WiFi Baby Monitor Lite, Philips IntelliVue WLAN, Photos in Wifi application, Sangfor Sundray WLAN Controller, Sannce Smart HD Wifi Security Camera EAN 2, SavySoda WiFi Free Hd, Siemens 3568i WAP, Siemens Gigaset WLAN Camera, SO Connect SO WIFI Hotspot Web Interface, Summer Baby Zoom Wifi Monitor , Summer Internet Viewing System, thingsSDK WiFi Scanner, TP-LINK ER, TP-LINK WAR, TP-LINK WVR, TRENDnet WiFi Baby Cam TV-IP743SIC, T&W WIFI Repeater BE126, U.S. Robotics USR808054 Wireless Access Point, VelotiSmart WiFi B-380 Camera, Visavi Wap-Motor, Wap Portal Server, Wap Portal Serve, Wap Portal Server, Wi-Fi Wifi Protected Setup Protocol, Wifi-soft UniBox, Wifi-soft UniBox controller, WiFiRanger, Xiaomi MIWiFi Xiaomi_55DD, Xiaomi Mi WiFi R3G, ZyXEL P2000W Wifi Phone

PublishedBaseTempVulnerabilityProdExpRemCTICVE
01/25/20225.45.4Netgear XR1000 SOAP Message missing authenticationXR1000Not DefinedNot Defined1.33CVE-2021-34870
01/25/20228.88.8Netgear R7450 mini_httpd improper authenticationAC2100/AC2400/AC2600/D7000v1/R6220/R6230/R6260/R6330/R6350/R6700v2/R6800/R6850/R6900v2/R7200/R7350/R7400/R7450Not DefinedNot Defined1.28CVE-2021-34865
01/14/20227.57.5Netgear R7000 SOAP Request authentication bypassR7000Not DefinedNot Defined0.10CVE-2021-34977
01/14/20228.88.8Netgear XR500 Environment Variable setupwizard.cgi stack-based overflowD3600/D6000/D6200/D7000/JR6150/PR2000/R6020/R6050/R6080/R6120/R6220/R6260/R6700v2/R6800/R6900v2/WNR2020/XR500Not DefinedNot Defined0.10CVE-2021-34980
01/14/20228.88.8Netgear R6260 SOAP Request buffer overflowR6260Not DefinedNot Defined0.00CVE-2021-34979
01/14/20228.88.8Netgear R6260 SOAP Request setupwizard.cgi stack-based overflowR6260Not DefinedNot Defined0.05CVE-2021-34978
12/31/20216.86.6Netgear RAX43 UART Interface hard-coded credentialsRAX43Not DefinedNot Defined0.00CVE-2021-20168
12/31/20213.73.6Netgear RAX43 Web Interface cleartext transmissionRAX43Not DefinedNot Defined0.04CVE-2021-20169
12/31/20213.53.4Netgear RAX43 Configuration File cleartext storageRAX43Not DefinedNot Defined0.00CVE-2021-20171
12/31/20215.04.8Netgear RAX43 Configuration Backup hard-coded credentialsRAX43Not DefinedNot Defined0.05CVE-2021-20170
12/31/20215.55.3Netgear RAX43 readycloud CGI Application command injectionRAX43Not DefinedNot Defined0.00CVE-2021-20167
12/31/20216.36.1Netgear RAX43 URL Parser buffer overflowRAX43Not DefinedNot Defined0.00CVE-2021-20166
12/26/20217.37.1Netgear AC2600 stack-based overflowR6260/R6800/R6700v2/R6900v2/R7450/AC2100/AC2400/AC2600Not DefinedOfficial Fix0.00CVE-2021-45573
12/26/20213.33.3Netgear RAX200/RAX20/RAX80/RAX15/RAX75 cross site scriptingRAX200/RAX20/RAX80/RAX15/RAX75Not DefinedOfficial Fix0.00CVE-2021-45676
12/26/20214.14.0Netgear AC2600 cross site scriptingR6120/R6260/R6850/R6350/R6330/R6800/R6700v2/R6900v2/R7200/R7350/R7400/R7450/AC2100/AC2400/AC2600Not DefinedOfficial Fix0.00CVE-2021-45675
12/26/20212.82.7Netgear R7000/R7900/R8000/RAX15/RAX20/RAX200/RAX75/RAX80 cross site scriptingR7000/R7900/R8000/RAX15/RAX20/RAX200/RAX75/RAX80Not DefinedOfficial Fix0.00CVE-2021-45674
12/26/20214.14.1Netgear R7000/R7900/R8000/RAX200/R7000P/RAX80/R6900P/RAX75 cross site scriptingR7000/R7900/R8000/RAX200/R7000P/RAX80/R6900P/RAX75Not DefinedOfficial Fix0.00CVE-2021-45673
12/26/20213.33.2Netgear RAX40 cross site scriptingD6200/D7000/R6020/R6080/R6120/R6220/R6230/R6260/R6800/R6900v2/R6700v2/R6850/R7200/R7350/R7400/R7450/AC2100/AC2400/AC2600/RAX40Not DefinedOfficial Fix0.08CVE-2021-45672
12/26/20214.44.4Netgear RBK852 cross site scriptingCBR40/EAX80/EX7500/R7900/R8000/RAX200/RBS40V/RBW30/MR60/RAX20/RAX45/RAX80/MS60/RAX15/RAX50/RAX75/RBR750/RBR850/RBS750/RBS850/RBK752/RBK852Not DefinedOfficial Fix0.00CVE-2021-45671
12/26/20214.44.4Netgear RBK852 cross site scriptingCBR40/EAX20/EAX80/EX6120/EX6130/EX7500/R7000/R7900/R8000/RAX200/RBS40V/RBW30/EX3700/MR60/R7000P/RAX20/RAX45/RAX80/EX3800/MS60/R6900P/RAX15/RAX50/RAX75/RBR750/RBR850/RBS750/RBS850/RBK752/RBK852Not DefinedOfficial Fix0.28CVE-2021-45670
12/26/20213.03.0Netgear RBK852 cross site scriptingRAX200/MR60/RAX20/RAX45/RAX80/MS60/RAX15/RAX50/RAX75/RBR750/RBR850/RBS750/RBS850/RBK752/RBK852Not DefinedOfficial Fix0.00CVE-2021-45669
12/26/20214.44.4Netgear RAX80 cross site scriptingEAX20/EAX80/EX3700/EX3800/EX6120/EX6130/EX7500/R7960P/R7900P/R8000P/RAX15/RAX20/RAX200/RAX45/RAX50/RAX75/RAX80Not DefinedOfficial Fix0.00CVE-2021-45668
12/26/20214.44.4Netgear RBK852 cross site scriptingCBR40/EAX20/EAX80/EX6120/EX6130/EX7500/R7960P/RAX200/RBS40V/RBW30/EX3700/MR60/R8000P/RAX20/RAX45/RAX80/EX3800/MS60/R7900P/RAX15/RAX50/RAX75/RBR750/RBR850/RBS750/RBS850/RBK752/RBK852Not DefinedOfficial Fix0.00CVE-2021-45667
12/26/20214.44.4Netgear CBR40 cross site scriptingCBR40/EAX80/EX3700/EX3800/EX6120/EX6130/EX7500/RBW30/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850/RBS40VNot DefinedOfficial Fix0.00CVE-2021-45666
12/26/20214.44.4Netgear EAX20 cross site scriptingEAX20/EAX80/EX3700/EX3800/EX6120/EX6130/EX7500/RBW30/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850/RBS40VNot DefinedOfficial Fix0.04CVE-2021-45665
12/26/20214.03.9Netgear R7000 cross site scriptingR7000Not DefinedOfficial Fix0.00CVE-2021-45664
12/26/20214.24.2Netgear R7000 cross site scriptingR7000Not DefinedOfficial Fix0.00CVE-2021-45663
12/26/20214.24.2Netgear R7000 cross site scriptingR7000Not DefinedOfficial Fix0.05CVE-2021-45662
12/26/20214.74.6Netgear RBK852 cross site scriptingCBR40/EAX20/EAX80/EX6120/EX6130/EX7000/EX7500/R7000/R7900/R7960P/R8000/RAX200/XR300/EX3700/MR60/R7000P/R8000P/RAX20/RAX50/RAX80/EX3800/MS60/R6900P/R7900P/RAX15/RAX45/RAX75/RBR750/RBR850/RBS750/RBS850/RBK752/RBK852Not DefinedOfficial Fix0.09CVE-2021-45639
12/26/20217.67.4Netgear R6900P/R7000/R7000P/RS400 Privilege EscalationR6900P/R7000/R7000P/RS400Not DefinedOfficial Fix1.10CVE-2021-45679
12/26/20215.55.3Netgear RAX200 codeRAX200Not DefinedOfficial Fix0.00CVE-2021-45678
12/26/20216.76.5Netgear RBK40 injectionRBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBS50YNot DefinedOfficial Fix0.00CVE-2021-45661
12/26/20216.76.5Netgear RBK40 injectionRBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBS50YNot DefinedOfficial Fix0.08CVE-2021-45660
12/26/20216.76.5Netgear RBK40 injectionRBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBS50YNot DefinedOfficial Fix0.10CVE-2021-45659
12/26/20216.76.5Netgear WNR2020 injectionD6200/D7000/R6020/R6080/R6050/JR6150/R6120/R6220/R6230/R6260/R6800/R6900v2/R6700v2/R7450/AC2100/AC2400/AC2600/RBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBS50Y/WNR2020Not DefinedOfficial Fix0.00CVE-2021-45657
12/26/20216.76.5Netgear D6200 injectionD6200/D7000/R6020/R6080/R6050/JR6150/R6120/R6220/R6230/R6260/R6800/R6900v2/R6700v2/R7450/AC2100/AC2400/AC2600/RBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50/RBS50YNot DefinedOfficial Fix0.00CVE-2021-45656
12/26/20215.65.5Netgear R6400 injectionR6400Not DefinedOfficial Fix0.00CVE-2021-45655
12/26/20217.27.1Netgear RBS50Y/SRK60/SRR60/SRS60/SXK30/SXR30/SXS30/SRC60 Configuration Remote Code ExecutionRBS50Y/SRK60/SRR60/SRS60/SXK30/SXR30/SXS30/SRC60Not DefinedOfficial Fix0.05CVE-2021-45645
12/26/20216.86.6Netgear R7450 Configuration Privilege EscalationAC2100/AC2400/AC2600/R6220/R6230/R6260/R6330/R6350/R6700v2/R6800/R6850/R6900v2/R7200/R7350/R7400/R7450Not DefinedOfficial Fix0.04CVE-2021-45644
12/26/20217.27.1Netgear R6400v2/R6700v3/XR1000 Configuration Remote Code ExecutionR6400v2/R6700v3/XR1000Not DefinedOfficial Fix0.05CVE-2021-45643
12/26/20216.66.5Netgear RBK50 Configuration Privilege EscalationD7800/EX6250/EX7700/LBR20/RBS50Y/R8900/R9000/XR450/XR500/XR700/EX7320/RAX120/EX7300v2/RAX120v2/EX6410/RBR10/RBR20/RBR40/RBR50/EX6420/RBS10/RBS20/RBS40/RBS50/EX6400v2/RBK12/RBK20/RBK40/RBK50Not DefinedOfficial Fix0.05CVE-2021-45642
12/26/20214.64.5Netgear XR500 Configuration unknown vulnerabilityD3600/D6000/D6200/D6220/D6400/D7000/D7000v2/D7800/D8500/DC112A/DGN2200v4/DGND2200Bv4/DM200/EX3700/EX3800/EX6120/EX6130/EX7000/PR2000/R6220/R6230/R6250/R6300v2/R6400/R6400v2/R6700/R6700v3/R6900/R7000/R7100LG/R7500v2/R7900P/R8000P/R8900/R9000/RBK20/RBK40/RBK50/RBR20/RBR40/RBR50/RBS20/RBS40/RBS50/WN3000RPv2/WNDR3400v3/WNR2000v5/WNR2020/WNR3500Lv2/XR450/XR500Not DefinedOfficial Fix0.05CVE-2021-45641
12/26/20213.93.8Netgear XR500 Configuration Privilege EscalationD3600/D6000/D6200/D6220/D6400/D7000/D7000v2/D7800/D8500/DC112A/DGN2200v4/DGND2200Bv4/DM200/EX3700/EX3800/EX6120/EX6130/EX7000/PR2000/R6220/R6230/R6250/R6300v2/R6400/R6400v2/R6700/R6700v3/R6900/R7000/R7100LG/R7500v2/R7900P/R8000P/R8900/R9000/RBK20/RBK40/RBK50/RBR20/RBR40/RBR50/RBS20/RBS40/RBS50/WN3000RPv2/WNDR3400v3/WNR2000v5/WNR2020/WNR3500Lv2/XR450/XR500Not DefinedOfficial Fix0.05CVE-2021-45640
12/26/20219.29.0Netgear D6220 stack-based overflowD6220/D6400/D7000v2/D8500/DC112A/R6300v2/R6400/R7000/R7100LG/RBS40V/RBW30/RS400/R7000P/R6900PNot DefinedOfficial Fix0.00CVE-2021-45638
12/26/20217.37.1Netgear AC2600 stack-based overflowaffects R6260/R6800/R6700v2/R6900v2/R7450/AC2100/AC2400/AC2600Not DefinedOfficial Fix0.05CVE-2021-45637
12/26/20215.95.7Netgear D7000 stack-based overflowD7000Not DefinedOfficial Fix0.06CVE-2021-45636
12/26/20219.29.0Netgear CBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 command injectionCBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.08CVE-2021-45635
12/26/20219.29.0Netgear CBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 command injectionCBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.00CVE-2021-45634
12/26/20219.29.0Netgear CBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 command injectionCBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.00CVE-2021-45633
12/26/20219.29.0Netgear CBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 command injectionCBR750/RBK752/RBR750/RBS750/RBK852/RBR850/RBS850Not DefinedOfficial Fix0.00CVE-2021-45632

1011 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!