Количество 3
Количество 3
CVE-2021-34978
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.
GHSA-4hvv-r2vp-wmj4
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.
BDU:2021-05318
Уязвимость компонента setupwizard.cgi микропрограммного обеспечения Wi-Fi роутеров NETGEAR AC2100, AC2400, AC2600, D7000, R6020, R6080, R6120, R6220, R6230, R6350, R6330, R6700v2, R6800, R6850, R6900v2, R7200, R7350, R7400, R7450, WAC124, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-34978 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511. | CVSS3: 8.8 | 0% Низкий | около 4 лет назад | |
GHSA-4hvv-r2vp-wmj4 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511. | 0% Низкий | около 4 лет назад | ||
BDU:2021-05318 Уязвимость компонента setupwizard.cgi микропрограммного обеспечения Wi-Fi роутеров NETGEAR AC2100, AC2400, AC2600, D7000, R6020, R6080, R6120, R6220, R6230, R6350, R6330, R6700v2, R6800, R6850, R6900v2, R7200, R7350, R7400, R7450, WAC124, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу