Vulnerabilities > Netgear > R6400V2 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-01 | CVE-2023-36187 | Classic Buffer Overflow vulnerability in Netgear products Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd. | 9.8 |
2022-12-30 | CVE-2022-48196 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. | 9.8 |
2021-12-26 | CVE-2021-45525 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45527 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. | 9.8 |
2021-12-26 | CVE-2021-45554 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an authenticated user. | 6.8 |
2021-12-26 | CVE-2021-45606 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45607 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45608 | Integer Overflow or Wraparound vulnerability in Netgear D7800 Firmware, R6400V2 Firmware and R6700V3 Firmware Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by an integer overflow by an unauthenticated attacker. | 9.8 |
2021-12-26 | CVE-2021-45610 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. | 9.8 |
2021-12-26 | CVE-2021-45612 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. | 9.8 |