Vulnerabilities > Netgear > R6260 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-25 | CVE-2021-34865 | Incorrect Comparison vulnerability in Netgear products This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of multiple NETGEAR routers. | 8.8 |
2022-01-13 | CVE-2021-34978 | Out-of-bounds Write vulnerability in Netgear R6260 Firmware 1.1.0.781.0.1 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. | 8.8 |
2022-01-13 | CVE-2021-34979 | Classic Buffer Overflow vulnerability in Netgear R6260 Firmware 1.1.0.781.0.1 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. | 8.8 |
2022-01-13 | CVE-2021-34980 | Out-of-bounds Write vulnerability in Netgear R6260 Firmware 1.1.0.781.0.1 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. | 8.8 |
2021-12-26 | CVE-2021-45501 | Unspecified vulnerability in Netgear products Certain NETGEAR devices are affected by authentication bypass. | 9.8 |
2021-12-26 | CVE-2021-45511 | Unspecified vulnerability in Netgear products Certain NETGEAR devices are affected by authentication bypass. | 9.8 |
2021-12-26 | CVE-2021-45534 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an authenticated user. | 7.8 |
2021-12-26 | CVE-2021-45551 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45573 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 8.8 |
2021-12-26 | CVE-2021-45637 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 9.8 |