Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D8500 before 1.0.3.58, R6250 before 1.0.4.48, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7900 before 1.0.4.38, R8300 before 1.0.2.144, R8500 before 1.0.2.144, XR300 before 1.0.3.68, R7000P before 1.3.2.132, and R6900P before 1.3.2.132.
References
Link | Resource |
---|---|
https://kb.netgear.com/000064483/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0274 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
07 Jan 2022, 19:31
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netgear r7900 Firmware
Netgear r8500 Netgear r8500 Firmware Netgear r6900p Firmware Netgear r6900p Netgear d8500 Firmware Netgear r8300 Firmware Netgear r6250 Firmware Netgear xr300 Netgear Netgear r7900 Netgear r7000 Netgear r7100lg Netgear d8500 Netgear xr300 Firmware Netgear r7100lg Firmware Netgear r6250 Netgear r8300 Netgear r7000 Firmware Netgear r7000p Netgear r7000p Firmware |
|
CPE | cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:* |
|
References | (MISC) https://kb.netgear.com/000064483/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0274 - Patch, Vendor Advisory | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
26 Dec 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-26 01:15
Updated : 2023-12-10 14:09
NVD link : CVE-2021-45609
Mitre link : CVE-2021-45609
CVE.ORG link : CVE-2021-45609
JSON object : View
Products Affected
netgear
- r8500_firmware
- r8300
- r6250_firmware
- r8300_firmware
- r7000p
- d8500
- r7900
- r6900p
- r7100lg_firmware
- xr300
- d8500_firmware
- r7100lg
- xr300_firmware
- r6250
- r6900p_firmware
- r8500
- r7900_firmware
- r7000p_firmware
- r7000
- r7000_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')