Vulnerabilities > Netgear > R6900P Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-12-26 | CVE-2021-45529 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. | 7.2 |
2021-12-26 | CVE-2021-45553 | Command Injection vulnerability in Netgear R6900P Firmware, R7000 Firmware and R7000P Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45605 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45606 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45607 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 8.8 |
2021-12-26 | CVE-2021-45647 | Information Exposure vulnerability in Netgear products Certain NETGEAR devices are affected by disclosure of sensitive information. | 7.5 |
2021-12-26 | CVE-2021-45650 | Information Exposure vulnerability in Netgear products Certain NETGEAR devices are affected by disclosure of sensitive information. | 7.5 |
2021-12-26 | CVE-2021-45679 | Unspecified vulnerability in Netgear products Certain NETGEAR devices are affected by privilege escalation. | 7.2 |
2021-11-15 | CVE-2021-34991 | Out-of-bounds Write vulnerability in Netgear products This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. | 8.8 |
2021-09-21 | CVE-2021-40847 | Cleartext Transmission of Sensitive Information vulnerability in Netgear products The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. | 8.1 |