Vulnerabilities > Netgear > R7000P Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-21 | CVE-2021-40847 | Cleartext Transmission of Sensitive Information vulnerability in Netgear products The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. | 8.1 |
2021-08-11 | CVE-2021-38539 | Unspecified vulnerability in Netgear products Certain NETGEAR devices are affected by privilege escalation. | 8.8 |
2021-08-11 | CVE-2021-38525 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 7.2 |
2021-08-11 | CVE-2021-38520 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an authenticated user. | 7.2 |
2021-03-29 | CVE-2021-27239 | Unspecified vulnerability in Netgear products This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. low complexity netgear | 8.8 |
2021-03-23 | CVE-2021-29080 | Weak Password Recovery Mechanism for Forgotten Password vulnerability in Netgear products Certain NETGEAR devices are affected by password reset by an unauthenticated attacker. | 8.1 |
2021-03-23 | CVE-2021-29068 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. | 8.8 |
2020-12-30 | CVE-2020-35798 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. | 7.8 |
2020-12-30 | CVE-2020-35787 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. | 8.0 |
2020-11-09 | CVE-2020-28373 | Out-of-bounds Write vulnerability in Netgear products upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. | 8.8 |