Vulnerabilities > Netgear > Gs724Tp Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-16 | CVE-2021-41314 | Injection vulnerability in Netgear products Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). | 8.8 |
2021-09-13 | CVE-2021-40866 | Unspecified vulnerability in Netgear products Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. low complexity netgear | 8.8 |
2021-09-13 | CVE-2021-40867 | Authentication Bypass by Spoofing vulnerability in Netgear products Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). | 7.1 |
2021-05-21 | CVE-2021-33514 | OS Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. | 9.8 |
2020-04-15 | CVE-2019-20676 | Missing Authorization vulnerability in Netgear products Certain NETGEAR devices are affected by lack of access control at the function level. | 6.0 |