Vulnerabilities > Netgear > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-12-26 | CVE-2021-45660 | Injection vulnerability in Netgear products Certain NETGEAR devices are affected by server-side injection. | 7.8 |
2021-12-26 | CVE-2021-45661 | Injection vulnerability in Netgear products Certain NETGEAR devices are affected by server-side injection. | 7.8 |
2021-12-26 | CVE-2021-45679 | Unspecified vulnerability in Netgear products Certain NETGEAR devices are affected by privilege escalation. | 7.2 |
2021-12-09 | CVE-2021-41449 | Path Traversal vulnerability in Netgear Rax35 Firmware, Rax38 Firmware and Rax40 Firmware A path traversal attack in web interfaces of Netgear RAX35, RAX38, and RAX40 routers before v1.0.4.102, allows a remote unauthenticated attacker to gain access to sensitive restricted information, such as forbidden files of the web application, via sending a specially crafted HTTP packet. | 7.1 |
2021-11-15 | CVE-2021-34991 | Out-of-bounds Write vulnerability in Netgear products This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. | 8.8 |
2021-09-21 | CVE-2021-40847 | Cleartext Transmission of Sensitive Information vulnerability in Netgear products The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. | 8.1 |
2021-09-17 | CVE-2021-41383 | Command Injection vulnerability in Netgear R6020 Firmware 1.0.0.48 setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the ntp_server field. | 7.2 |
2021-09-16 | CVE-2021-41314 | Injection vulnerability in Netgear products Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). | 8.8 |
2021-09-13 | CVE-2021-40866 | Unspecified vulnerability in Netgear products Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. low complexity netgear | 8.8 |
2021-09-13 | CVE-2021-40867 | Authentication Bypass by Spoofing vulnerability in Netgear products Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). | 7.1 |