Vulnerabilites related to netgear - cbk40
CVE-2020-35800 (GCVE-0-2020-35800)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:09:15.177Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://kb.netgear.com/000062733/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0112", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D6000 before 1.0.0.80, D6220 before 1.0.0.60, D6400 before 1.0.0.94, D7000v2 before 1.0.0.62, D7800 before 1.0.3.48, D8500 before 1.0.3.50, DC112A before 1.0.0.48, DGN2200v4 before 1.0.0.114, DM200 before 1.0.0.66, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX2700 before 1.0.1.58, EX3110 before 1.0.1.68, EX3700 before 1.0.0.84, EX3800 before 1.0.0.84, EX3920 before 1.0.0.84, EX6000 before 1.0.0.44, EX6100v2 before 1.0.1.94, EX6110 before 1.0.1.68, EX6120 before 1.0.0.54, EX6130 before 1.0.0.36, EX6150v1 before 1.0.0.46, EX6150v2 before 1.0.1.94, EX6200v1 before 1.0.3.94, EX6250 before 1.0.0.128, EX6400 before 1.0.2.152, EX6400v2 before 1.0.0.128, EX6410 before 1.0.0.128, EX6920 before 1.0.0.54, EX7000 before 1.0.1.90, EX7300 before 1.0.2.152, EX7300v2 before 1.0.0.128, EX7320 before 1.0.0.128, EX7500 before 1.0.0.68, EX7700 before 1.0.0.210, EX8000 before 1.0.1.224, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6250 before 1.0.4.42, R6260 before 1.1.0.76, R6300v2 before 1.0.4.42, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400v1 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700v1 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900 before 1.0.2.16, R6900P before 1.3.2.124, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7100LG before 1.0.0.56, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7500v2 before 1.0.3.48, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8300 before 1.0.2.134, R8500 before 1.0.2.134, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.5.24, RAX35 before 1.0.3.80, RAX40 before 1.0.3.80, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.38, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBS40V before 2.5.1.6, RBS40V-200 before 1.0.0.46, RBS50Y before 2.6.1.40, RBW30 before 2.5.0.4, RS400 before 1.5.0.48, WN2500RPv2 before 1.0.1.56, WN3000RPv3 before 1.0.2.86, WN3500RPv1 before 1.0.0.28, WNDR3400v3 before 1.0.1.32, WNR1000v3 before 1.0.2.78, WNR2000v2 before 1.2.0.12, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 9.4, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:L/C:H/I:H/PR:N/S:U/UI:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-12-29T23:29:39", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://kb.netgear.com/000062733/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0112", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-35800", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D6000 before 1.0.0.80, D6220 before 1.0.0.60, D6400 before 1.0.0.94, D7000v2 before 1.0.0.62, D7800 before 1.0.3.48, D8500 before 1.0.3.50, DC112A before 1.0.0.48, DGN2200v4 before 1.0.0.114, DM200 before 1.0.0.66, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX2700 before 1.0.1.58, EX3110 before 1.0.1.68, EX3700 before 1.0.0.84, EX3800 before 1.0.0.84, EX3920 before 1.0.0.84, EX6000 before 1.0.0.44, EX6100v2 before 1.0.1.94, EX6110 before 1.0.1.68, EX6120 before 1.0.0.54, EX6130 before 1.0.0.36, EX6150v1 before 1.0.0.46, EX6150v2 before 1.0.1.94, EX6200v1 before 1.0.3.94, EX6250 before 1.0.0.128, EX6400 before 1.0.2.152, EX6400v2 before 1.0.0.128, EX6410 before 1.0.0.128, EX6920 before 1.0.0.54, EX7000 before 1.0.1.90, EX7300 before 1.0.2.152, EX7300v2 before 1.0.0.128, EX7320 before 1.0.0.128, EX7500 before 1.0.0.68, EX7700 before 1.0.0.210, EX8000 before 1.0.1.224, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6250 before 1.0.4.42, R6260 before 1.1.0.76, R6300v2 before 1.0.4.42, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400v1 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700v1 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900 before 1.0.2.16, R6900P before 1.3.2.124, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7100LG before 1.0.0.56, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7500v2 before 1.0.3.48, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8300 before 1.0.2.134, R8500 before 1.0.2.134, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.5.24, RAX35 before 1.0.3.80, RAX40 before 1.0.3.80, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.38, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBS40V before 2.5.1.6, RBS40V-200 before 1.0.0.46, RBS50Y before 2.6.1.40, RBW30 before 2.5.0.4, RS400 before 1.5.0.48, WN2500RPv2 before 1.0.1.56, WN3000RPv3 before 1.0.2.86, WN3500RPv1 before 1.0.0.28, WNDR3400v3 before 1.0.1.32, WNR1000v3 before 1.0.2.78, WNR2000v2 before 1.2.0.12, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:L/C:H/I:H/PR:N/S:U/UI:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://kb.netgear.com/000062733/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0112", refsource: "MISC", url: "https://kb.netgear.com/000062733/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0112", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-35800", datePublished: "2020-12-29T23:29:39", dateReserved: "2020-12-29T00:00:00", dateUpdated: "2024-08-04T17:09:15.177Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-27861 (GCVE-0-2020-27861)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T16:25:43.503Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Orbi", vendor: "NETGEAR", versions: [ { status: "affected", version: "2.5.1.16", }, ], }, ], credits: [ { lang: "en", value: "Shaunak Mirani", }, ], descriptions: [ { lang: "en", value: "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-12T13:50:22", orgId: "99f1926a-a320-47d8-bbb5-42feb611262e", shortName: "zdi", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", }, { tags: [ "x_refsource_MISC", ], url: "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "zdi-disclosures@trendmicro.com", ID: "CVE-2020-27861", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Orbi", version: { version_data: [ { version_value: "2.5.1.16", }, ], }, }, ], }, vendor_name: "NETGEAR", }, ], }, }, credit: "Shaunak Mirani", data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.", }, ], }, impact: { cvss: { vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, ], }, ], }, references: { reference_data: [ { name: "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", }, { name: "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", refsource: "MISC", url: "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "99f1926a-a320-47d8-bbb5-42feb611262e", assignerShortName: "zdi", cveId: "CVE-2020-27861", datePublished: "2021-02-11T23:35:36", dateReserved: "2020-10-27T00:00:00", dateUpdated: "2024-08-04T16:25:43.503Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-35795 (GCVE-0-2020-35795)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:09:15.223Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D7800 before 1.0.1.58, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RS400 before 1.5.0.48, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-12-29T23:29:56", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-35795", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D7800 before 1.0.1.58, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RS400 before 1.5.0.48, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154", refsource: "MISC", url: "https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-35795", datePublished: "2020-12-29T23:29:56", dateReserved: "2020-12-29T00:00:00", dateUpdated: "2024-08-04T17:09:15.223Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DA0F1EB-D7F3-466B-BE3F-0600C4120870", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*", matchCriteriaId: "E526746E-1ED6-492E-B28C-A1CA8235D9FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbk43_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A41A8FB-9891-4553-BD1E-BB11D904D774", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbk43:-:*:*:*:*:*:*:*", matchCriteriaId: "582259CB-2616-4A3F-A9B6-C44640C00B11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C9B6DD4-11E1-496F-909F-0A50203A8D01", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", matchCriteriaId: "AE0F7E9E-196C-4106-B1C9-C16FA5910A0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CFB377D0-AF61-4A9F-B9B5-71F68B13E081", versionEndExcluding: "1.0.1.82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6200:v2:*:*:*:*:*:*:*", matchCriteriaId: "B4F62287-CB55-4FB1-AA39-62018654BA39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6566C37A-252E-4301-952E-5C6F19F42326", versionEndExcluding: "1.0.0.210", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*", matchCriteriaId: "0D140E3B-9AE5-473A-82DE-9B9DBAE4C34A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "456DA66C-6B99-4D0D-8F32-952905F9C752", versionEndExcluding: "1.0.1.224", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*", matchCriteriaId: "8D9781C9-799A-4BDA-A027-987627A01633", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9EC30751-F447-45A7-8C57-B73042869EA5", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*", matchCriteriaId: "D5465A78-4826-4F72-9CBE-528CBF286A79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk13_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E7758BF-0AE4-46DB-A014-734F68AEEAA0", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk13:-:*:*:*:*:*:*:*", matchCriteriaId: "783EEEE0-BB9A-4C54-82B2-046B1033091C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk14_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B7CD38DB-B4A3-460E-8F89-E85A0E0F5BD3", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk14:-:*:*:*:*:*:*:*", matchCriteriaId: "4CD91050-5FE0-4810-8E6F-EF9B9B2F02E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk15_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E25990D-C38A-44E7-A301-AB9E80A9D5CA", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk15:-:*:*:*:*:*:*:*", matchCriteriaId: "B801EC38-5B86-49F2-AB81-63F0F07A9BBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8246B8D3-8455-43B1-B0FA-F677B8FF84F5", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5DADAA79-9A5C-4B6F-A58D-704ACD1C3334", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28DA498C-B466-422E-BAD2-A1F9A15B157F", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*", matchCriteriaId: "32BAB5C0-F645-4A90-833F-6345335FA1AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk20w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78B13562-D83E-4FDB-9EFF-CA9178487F6D", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk20w:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD3D5A1-AD84-448C-9749-6E6050BC7BD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk23w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2AF75EFB-3A9E-49C8-AC78-62E85A565BA5", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk23w:-:*:*:*:*:*:*:*", matchCriteriaId: "A1922BDC-5675-40D6-ACB1-DA37CE29E983", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk20_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4CC4CE9F-0BE6-411B-88DA-B556BF176A03", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk20_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D00E9E02-41D7-449E-990E-B6D77E257C66", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", matchCriteriaId: "E6C9F31C-3E12-4787-9C9B-14883D9D152A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk22_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBEC1C34-0D1B-4F04-972B-631C5D4C949B", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk22_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "441F02E6-28B8-4370-AFE0-CC0AC7BAE468", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk22:-:*:*:*:*:*:*:*", matchCriteriaId: "2E1BA765-5318-4A96-885D-3078148A74E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk23_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5679C75-E6C0-42A3-8F0C-AB01E521C654", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk23_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F03405C-03F0-4519-AB67-DF130B2F6A58", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk23:-:*:*:*:*:*:*:*", matchCriteriaId: "17D7D346-6F52-4473-A4EA-6059C177BF0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C80BEFF8-7094-4F21-B9E7-EE5C8B9DF3B3", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", matchCriteriaId: "AE5DBD66-9C2A-4EFF-87AB-03E791D584B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04F03BE5-1440-4BC4-B902-97E702ED0ADF", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", matchCriteriaId: "14FC7F5B-7E4F-4A68-8427-D1F553EBE8CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk30_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C67589C-60B0-4E0C-8A96-B14ACCDA3530", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk30:-:*:*:*:*:*:*:*", matchCriteriaId: "FC72B028-AB28-43FC-9675-60CC8BAC0D03", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk33_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "728792F6-E1F9-4091-A3B7-E14E38046887", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk33:-:*:*:*:*:*:*:*", matchCriteriaId: "69EEAF94-1853-49A7-979E-A72393C9D2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk40_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D0E7860-D090-4292-8695-6ADC62DBBF45", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk40_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "126A1A8E-6D4F-487C-A6C0-D3EB2227373F", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", matchCriteriaId: "12DDD83C-6FF1-433F-ACA1-7B4B147F9A8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk43_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FA824C34-9C10-4267-8756-CAB2D6C059E1", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk43_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AE23B04-F203-43A4-AEFB-7B97C27AE8D9", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk43:-:*:*:*:*:*:*:*", matchCriteriaId: "EC2B9C48-9FE6-462B-88EE-046F15E66430", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk43s_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90F559B5-D5B4-4A64-8739-9A085A648A3E", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk43s_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BEB1817-8191-407B-97B2-3D93BCCB4184", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk43s:-:*:*:*:*:*:*:*", matchCriteriaId: "A5604E66-E9CC-4B78-AF6A-2341B30E3594", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk44_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71232620-E9DE-4227-B531-685BB33BF3AC", versionEndExcluding: "2.6.1.36", vulnerable: true, }, { criteria: "cpe:2.3:o:netgear:rbk44_satellite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08102CF5-1CB9-4839-84F9-54233F4B1F09", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk44:-:*:*:*:*:*:*:*", matchCriteriaId: "1924FC8B-4031-4EA3-B214-AF6F77D94654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E21623E-9977-486F-93B1-858FC407E9D1", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", matchCriteriaId: "A9E20E59-2B1E-4E43-A494-2C20FD716D4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A32769CF-7D0A-4A3F-AF20-6202CA0C6870", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", matchCriteriaId: "6FDCDE39-0355-43B9-BF57-F3718DA2988D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0E3BFCB-BFF8-4722-BE48-5FA93CACD3AD", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA66D07-D017-49D6-8E72-5C48E940DE1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk50v_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5540756-07E2-463E-8B45-87A1FEEE0B1D", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk50v:-:*:*:*:*:*:*:*", matchCriteriaId: "54453B5D-4E51-4DAB-8670-5A99C0D4CE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk52w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "426AA184-3B9E-42AF-85E2-F034D7E9B845", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk52w:-:*:*:*:*:*:*:*", matchCriteriaId: "B6FABBC7-5C16-4630-8185-AADF3A9D6E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39D6318D-F5A2-4469-B508-075F2825F0FA", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", matchCriteriaId: "B2CAEA32-6934-4743-9E6B-22D52AC5E7F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F44708A-C946-4E0F-9D6C-A91AFB4C9EF3", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", matchCriteriaId: "3BCFD959-D522-4FA0-AD01-2937DAEE1EDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.", }, { lang: "es", value: "Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar código arbitrario en las instalaciones afectadas de los enrutadores NETGEAR Orbi versión 2.5.1.16. No es requerida una autenticación para explotar esta vulnerabilidad. El fallo específico se presenta dentro de la utilidad UA_Parser. Una opción de nombre de host diseñada en una petición DHCP puede desencadenar la ejecución de una llamada de sistema compuesta a partir de una cadena suministrada por el usuario. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de root. Era ZDI-CAN-11076", }, ], id: "CVE-2020-27861", lastModified: "2024-11-21T05:21:57.107", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-02-12T00:15:12.500", references: [ { source: "zdi-disclosures@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", }, { source: "zdi-disclosures@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1430/", }, ], sourceIdentifier: "zdi-disclosures@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C1280B1-A2DF-4CAB-AB19-6B463206AA3D", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*", matchCriteriaId: "A80B06A1-81B5-4C33-89F6-EC3F6E3068B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76C658A4-BF82-40CE-A5E1-C9F3DA1A9B0B", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*", matchCriteriaId: "6B25A18F-DD96-45FE-B098-71E60CB0FFFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A3A6655-B468-46FB-84D7-2294D4243C91", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*", matchCriteriaId: "2BFCD9A8-1846-48C4-9F14-3866E983FB74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C3B3284-B11F-4752-9C6A-0B5BECA3DB2B", versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*", matchCriteriaId: "E526746E-1ED6-492E-B28C-A1CA8235D9FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B05686E-7206-4E3B-BDBD-05C8EA6CABB5", versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", matchCriteriaId: "AE0F7E9E-196C-4106-B1C9-C16FA5910A0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACEAC1F2-EEAE-4880-B6C0-FFAAA29685F1", versionEndExcluding: "1.0.1.58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", matchCriteriaId: "DA2D4987-3726-4A72-8D32-592F59FAC46D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62EFA314-85C0-48CC-938E-E2BF42B16746", versionEndExcluding: "1.0.0.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*", matchCriteriaId: "A9D3B54B-33C0-4E50-AD2B-2097C612F288", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7EE6BC6-DEDA-4005-9E29-D66D0BC7E5C2", versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*", matchCriteriaId: "97740F5D-063E-424F-A0FE-09EBE1100975", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B59B0C17-2714-48E8-8911-E72488CE32E3", versionEndExcluding: "1.0.0.68", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", matchCriteriaId: "44336289-F9DA-4779-8C1A-0221E29E2E2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7658849-0743-487B-803F-D49680EDF185", versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", matchCriteriaId: "69A79475-37BE-47BD-A629-DCEF22500B0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E18CCBB-46CD-423D-AA66-36F223EFD6E6", versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB3ECD-2F0B-4625-A1DB-F6CEFC46E277", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07A1D7A9-29E9-4B1D-90DB-24E0967C9BC7", versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", matchCriteriaId: "F003F064-591C-4D7C-9EC4-D0E553BC6683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F898DC9-9250-47DF-844C-F7308365135B", versionEndExcluding: "1.0.0.70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", matchCriteriaId: "D18D2CCD-424F-41D5-919B-E22B9FA68D36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79B24229-6AC2-489D-B542-4DAA7E630180", versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", matchCriteriaId: "B131B5C8-CB7F-433B-BA32-F05CE0E92A66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B5B842D-2275-4968-997B-A70A67CBDBEC", versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*", matchCriteriaId: "C91CADFA-59DB-4B6C-A914-848884F4A4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23D4F7E6-C042-434E-87B8-55DB18B08B0A", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", matchCriteriaId: "3C395D49-57F9-4BC1-8619-57127355B86B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6524B85E-23AC-4983-8331-96E12899B773", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:*", matchCriteriaId: "D621D26D-B144-424A-A9CB-19488399ACC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9F105F6F-ECD3-411D-924E-94BCF036C1EA", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*", matchCriteriaId: "4B302909-29CF-4E53-9CCB-8664D3FCB03A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "478CE991-5E30-438D-94B0-0E15A29E27BD", versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", matchCriteriaId: "3E4CDF6B-3829-44D0-9675-71D7BE83CAA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E32C097-6EDF-4C81-A375-028DB67B6231", versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", matchCriteriaId: "AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19D625E4-17F4-44EF-9A51-DA0BAD4835F2", versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", matchCriteriaId: "21B27F11-4262-4CE1-8107-B365A7C152F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C5AB644-B80D-48A3-B794-C483FEFAFDED", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*", matchCriteriaId: "C9793286-86D2-43BF-B9B8-823C05BCAE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCCFD041-9413-4E37-8C4D-F50D1B10582B", versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", matchCriteriaId: "C88DA385-5FAE-49EC-80D6-78F81E7EEC16", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8956A99-1071-42A7-8984-D7134E755CBF", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", matchCriteriaId: "09404083-B00B-4C1F-8085-BC242E625CA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3408536D-FC77-48C5-AD15-C5A170D7417C", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", matchCriteriaId: "598B48C5-4706-4431-8C5A-DA496DD1052F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61DE3850-1661-43D1-9E52-31E2E01979EE", versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", matchCriteriaId: "C41908FF-AE64-4949-80E3-BEE061B2DA8A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D59AC0-2859-46C0-B050-3BB8E3E9CB06", versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", matchCriteriaId: "0794BB7C-1BCF-4F08-8EB2-9C3B150C105A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02672757-31FD-4338-AF2C-63FD1D7C1A19", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FC6398-60A5-4003-A294-C96AE6DBCED5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D208F2CA-DB20-4C82-8FFF-B99EBFE29713", versionEndExcluding: "1.0.11.106", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", matchCriteriaId: "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C6F506A-464D-4BDE-8F9B-D537D3C7E137", versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", matchCriteriaId: "DFE55F4D-E98B-46D3-B870-041141934CD1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02279B20-D951-46CE-B339-452BC585A4F3", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7200:-:*:*:*:*:*:*:*", matchCriteriaId: "FECB83F9-D417-4FD3-B293-87BC177E3AEB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B452611A-43C5-401B-95BD-189020B5C65C", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7350:-:*:*:*:*:*:*:*", matchCriteriaId: "AFD1A65C-F10F-4C52-8B6D-69992E512EB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "237C68C0-C2A9-4F71-9E08-547F2A317CBC", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7400:-:*:*:*:*:*:*:*", matchCriteriaId: "1F68AC3B-A31F-4AB0-89E9-BFFDE427AD3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63697E3A-AAA3-42E7-8116-93C6548D3AB7", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*", matchCriteriaId: "6DA5420D-DD64-4A9C-9B5F-784F0ED2B464", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C393DBF4-8281-4611-B591-CDB9DF0AA958", versionEndExcluding: "1.0.2.74", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", matchCriteriaId: "17CF7445-6950-45FE-9D1A-E23F63316329", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4171EB00-3664-43D5-9B62-A3538C358142", versionEndExcluding: "1.0.5.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*", matchCriteriaId: "DAF94D73-B6D0-4334-9A41-83AA92B7C6DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9800CB2-C14A-406B-B1FF-B1B62862EBDB", versionEndExcluding: "1.0.4.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", matchCriteriaId: "C484840F-AF30-4B5C-821A-4DB9BE407BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44537647-E0B2-477D-98A5-7EA850BF3321", versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D6A70D-66AF-4064-9F1B-4358D4B1F016", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA8D0327-0A72-44EC-9CC2-6CAF6A0C08B2", versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", matchCriteriaId: "091CEDB5-0069-4253-86D8-B9FE17CB9F24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F030129E-95C6-4C31-92A6-DABCDC1B534B", versionEndExcluding: "1.0.4.58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", matchCriteriaId: "5B39F095-8FE8-43FD-A866-7B613B495984", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B377E02-0228-4A2F-90F3-A82E7E964B37", versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", matchCriteriaId: "F7EF872D-2537-4FEB-8799-499FC9D44339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57314D03-64B1-4973-9D36-5D22A71DBCBB", versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", matchCriteriaId: "0F859165-8D89-4CDD-9D48-9C7923D2261F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DCE56F2-5A45-4B31-99EF-1D8455C71E5C", versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", matchCriteriaId: "D74F1BFC-562E-4E7D-BBAB-2F8B593B5A57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B697A877-214C-4701-AA9B-FE9C23FDBCEB", versionEndExcluding: "1.0.1.136", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", matchCriteriaId: "1742BD56-84E4-40E1-8C04-098B3715161E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC5225D5-96AD-43EE-BAA3-37B7FEF97E86", versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", matchCriteriaId: "B624B4D3-BCF4-4F95-B401-A88BEC3145A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33505A97-35DB-4EFD-9D47-EA03057C8FFD", versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", matchCriteriaId: "7038703C-C79D-4DD4-8B16-E1A5FC6694C0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49D5D1E8-637A-4970-8753-6A3FCA8FAC64", versionEndExcluding: "1.0.2.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", matchCriteriaId: "58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A3B894E-E712-477A-9960-30AFAB2C35CF", versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", matchCriteriaId: "4B08BD69-CDCC-4CEB-B887-4E47D2B45D26", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A71AE85C-74C4-42C1-BF54-89B6EC38C707", versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", matchCriteriaId: "C430976E-24C0-4EA7-BF54-F9C188AB9C01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADDF0077-E02C-4DDA-A84E-DF3A0237FC66", versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", matchCriteriaId: "1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81DF924F-FDA4-4588-B8A3-6F18ABBD4976", versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", matchCriteriaId: "06B5A85C-3588-4263-B9AD-4E56D3F6CB16", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9EC30751-F447-45A7-8C57-B73042869EA5", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*", matchCriteriaId: "D5465A78-4826-4F72-9CBE-528CBF286A79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8246B8D3-8455-43B1-B0FA-F677B8FF84F5", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5DADAA79-9A5C-4B6F-A58D-704ACD1C3334", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28DA498C-B466-422E-BAD2-A1F9A15B157F", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*", matchCriteriaId: "32BAB5C0-F645-4A90-833F-6345335FA1AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E72FDDB4-0802-467B-A255-06C8CE1A0B92", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", matchCriteriaId: "E6C9F31C-3E12-4787-9C9B-14883D9D152A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C80BEFF8-7094-4F21-B9E7-EE5C8B9DF3B3", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", matchCriteriaId: "AE5DBD66-9C2A-4EFF-87AB-03E791D584B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04F03BE5-1440-4BC4-B902-97E702ED0ADF", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", matchCriteriaId: "14FC7F5B-7E4F-4A68-8427-D1F553EBE8CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09631703-25CD-40CB-80A8-AADD43939507", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", matchCriteriaId: "12DDD83C-6FF1-433F-ACA1-7B4B147F9A8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E21623E-9977-486F-93B1-858FC407E9D1", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", matchCriteriaId: "A9E20E59-2B1E-4E43-A494-2C20FD716D4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A32769CF-7D0A-4A3F-AF20-6202CA0C6870", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", matchCriteriaId: "6FDCDE39-0355-43B9-BF57-F3718DA2988D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0E3BFCB-BFF8-4722-BE48-5FA93CACD3AD", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA66D07-D017-49D6-8E72-5C48E940DE1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39D6318D-F5A2-4469-B508-075F2825F0FA", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", matchCriteriaId: "B2CAEA32-6934-4743-9E6B-22D52AC5E7F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F44708A-C946-4E0F-9D6C-A91AFB4C9EF3", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", matchCriteriaId: "3BCFD959-D522-4FA0-AD01-2937DAEE1EDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDD03FFF-ECAF-4527-A195-559DF479A0F2", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", matchCriteriaId: "A45832BD-114D-42F1-B9F1-7532496D30A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05A46FA9-5DC8-4408-B4C2-AD5F1CABE7C1", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", matchCriteriaId: "C13F5C69-FA9B-472A-9036-0C2967BDCDE9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C144D71-6C10-44CD-BFF9-907A92F0432C", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", matchCriteriaId: "B529194C-C440-4BC3-850F-0613FC548F86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F5C6DF5F-FEFB-4A30-87CC-379E726AE181", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk842:-:*:*:*:*:*:*:*", matchCriteriaId: "0E9B19B2-5FF1-4C85-8504-C33C34F072B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "451C5603-927A-4EB9-BF9D-150FE16A48F8", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*", matchCriteriaId: "4489CB05-A1C0-408C-8D8C-56EE98CA20E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B22B149-BD16-42A0-BB1D-DEF483F6B5E1", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*", matchCriteriaId: "84AEA27B-8BEA-4E83-819A-FDAC1881928F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B66A716A-7EC5-4F9B-853A-36C0D1AA3BFE", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", matchCriteriaId: "14F257FE-31CE-4F74-829D-29407D74ADF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE13548D-0A26-45C1-8424-D4705EB105EA", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", matchCriteriaId: "D92E4C8E-222A-476C-8273-F7171FC61F0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "041D94DE-78C9-475C-9FAE-0B081C69B55F", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", matchCriteriaId: "221CA950-E984-44CD-9E1B-3AADE3CEBE52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "921A8CFC-D86E-4674-998E-31F4F956B5DC", versionEndExcluding: "1.5.0.48", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", matchCriteriaId: "2700644E-0940-4D05-B3CA-904D91739E58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D71EDB94-370B-46C3-A14E-3F3FB130DD49", versionEndExcluding: "1.0.3.50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", matchCriteriaId: "5590CF28-B88A-4755-904B-1BC1778FBEDD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "051E8D2A-0EB0-43A7-9AAA-8519B8CC7FE0", versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*", matchCriteriaId: "66B9CE4D-D1EC-4F55-8226-D159CF5F3AB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BCFB551-95C6-4EEF-83F0-4246F67E6668", versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*", matchCriteriaId: "9E203D92-F97B-4F5B-B395-3A5DEDBF1C1C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89AB672D-DD24-483E-B69D-7E46AF199483", versionEndExcluding: "1.0.1.34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*", matchCriteriaId: "E12892C8-5E01-49A6-BF47-09D630377093", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D7800 before 1.0.1.58, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RS400 before 1.5.0.48, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34.", }, { lang: "es", value: "Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer por parte de un atacante no autenticado. Esto afecta a AC2100 versiones anteriores a 1.2.0.72, AC2400 versiones anteriores a 1.2.0.72, AC2600 versiones anteriores a 1.2.0.72, CBK40 versiones anteriores a 2.5.0.10, CBR40 versiones anteriores a 2.5.0.10, D7800 versiones anteriores a 1.0.1.58, EAX20 versiones anteriores a 1.0.0.36, EAX80 versiones anteriores a 1.0.1.62, EX7500 versiones anteriores a 1.0.0.68, MK62 versiones anteriores a 1.0.5.102, MR60 versiones anteriores a 1.0.5.102, MS60 versiones anteriores a 1.0.5.102, R6120 versiones anteriores a 1.0.0.70, R6220 versiones anteriores a 1.1.0.100, R6230 versiones anteriores a 1.1.0.100, R6260 versiones anteriores a 1.1.0.76, R6330 versiones anteriores a 1.1.0.76, R6350 versiones anteriores a 1.1.0.76, R6400 versiones anteriores a 1.0.1.62, R6400v2 versiones anteriores a 1.0.4.98, R6700 versiones anteriores a 1.0.2.16, R6700v2 versiones anteriores a 1.2.0.72, R6700v3 versiones anteriores a 1.0.4.98, R6800 versiones anteriores a 1.2.0.72, R6850 versiones anteriores a 1.1. 0.76, R6900P versiones anteriores a 1.3.2.124, R6900 versiones anteriores a 1.0.2.16, R6900v2 versiones anteriores a 1.2.0.72, R7000 versiones anteriores a 1.0.11.106, R7000P versiones anteriores a 1.3.2.124, R7200 versiones anteriores a 1.2.0.72, R7350 versiones anteriores a 1.2.0.72, R7400 versiones anteriores a 1.2.0.72, R7450 versiones anteriores a 1.2.0.72, R7800 versiones anteriores a 1.0.2.74, R7850 versiones anteriores a 1.0.5.60, R7900 versiones anteriores a 1.0.4.26, R7900P versiones anteriores a 1.4.1.62, R7960P versiones anteriores a 1.4.1.62, R8000 versiones anteriores a 1.0.4.58, R8000P versiones anteriores a 1.4.1.62, R8900 versiones anteriores a 1.0.5.24, R9000 versiones anteriores a 1.0.5.24, RAX120 versiones anteriores a 1.0.1.136, RAX15 versiones anteriores a 1.0.1.64, RAX20 versiones anteriores a 1.0.1.64, RAX200 versiones anteriores a 1.0. 2.102, RAX45 versiones anteriores a 1.0.2.64, RAX50 versiones anteriores a 1.0.2.64, RAX75 versiones anteriores a 1.0.3.102, RAX80 versiones anteriores a 1.0.3.102, RBK12 versiones anteriores a 2.6.1.44, RBR10 versiones anteriores a 2.6.1.44, RBS10 versiones anteriores a 2.6.1.44, RBK20 versiones anteriores a 2.6.1.38, RBR20 versiones anteriores a 2.6.1.36, RBS20 versiones anteriores a 2.6.1.38, RBK40 versiones anteriores a 2.6.1.38, RBR40 versiones anteriores a 2.6.1.36, RBS40 versiones anteriores a 2.6.1.38, RBK50 versiones anteriores a 2.6.1.40, RBR50 versiones anteriores a 2.6.1.40, RBS50 versiones anteriores a 2.6.1.40, RBK752 versiones anteriores a 3.2.16.6, RBR750 versiones anteriores a 3.2.16.6, RBS750 versiones anteriores a 3.2.16.6, RBK752 versiones anteriores a 3.2.16.6, RBR750 versiones anteriores a 3.2.16.6, RBS750 versiones anteriores a 3.2.16.6, RBK842 versiones anteriores a 3.2.16.6, RBR840 versiones anteriores a 3.2.16.6, RBS840 versiones anteriores a 3.2. 16.6, RBK852 versiones anteriores a 3. 2.16.6, RBR850 versiones anteriores a 3.2.16.6, RBS850 versiones anteriores a 3.2.16.6, RS400 versiones anteriores a 1.5.0.48, XR300 versiones anteriores a 1.0.3.50, XR450 versiones anteriores a 2.3.2.66, XR500 versiones anteriores a 2.3.2.66 y XR700 versiones anteriores a 1.0.1.34.", }, ], id: "CVE-2020-35795", lastModified: "2024-11-21T05:28:07.420", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "cve@mitre.org", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-12-30T00:15:14.080", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
9.4 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C1280B1-A2DF-4CAB-AB19-6B463206AA3D", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*", matchCriteriaId: "A80B06A1-81B5-4C33-89F6-EC3F6E3068B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76C658A4-BF82-40CE-A5E1-C9F3DA1A9B0B", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*", matchCriteriaId: "6B25A18F-DD96-45FE-B098-71E60CB0FFFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A3A6655-B468-46FB-84D7-2294D4243C91", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*", matchCriteriaId: "2BFCD9A8-1846-48C4-9F14-3866E983FB74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C3B3284-B11F-4752-9C6A-0B5BECA3DB2B", versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*", matchCriteriaId: "E526746E-1ED6-492E-B28C-A1CA8235D9FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B05686E-7206-4E3B-BDBD-05C8EA6CABB5", versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", matchCriteriaId: "AE0F7E9E-196C-4106-B1C9-C16FA5910A0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "762CAE87-3C98-4DB8-9B3D-5CCC3D555004", versionEndExcluding: "1.0.0.80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*", matchCriteriaId: "6F6EA344-FF99-4F27-9860-3C5BE07345A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2A04BB9-E816-49B5-B539-4B36A5CFFA22", versionEndExcluding: "1.0.0.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", matchCriteriaId: "F3EEA190-2E9C-4586-BF81-B115532FBA23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F4BC21D-8354-4C71-BE68-9D1A14A9471F", versionEndExcluding: "1.0.0.94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", matchCriteriaId: "7D30939B-86E3-4C78-9B05-686B4994C8B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3DCFE88-1262-43BF-88BB-B26658EDEDF1", versionEndExcluding: "1.0.0.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*", matchCriteriaId: "6DC6BD34-1A2C-4247-A20C-0B44C0F56E0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93A32171-41B3-43DF-9027-51382D83158A", versionEndExcluding: "1.0.3.48", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", matchCriteriaId: "DA2D4987-3726-4A72-8D32-592F59FAC46D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F3F88DD-CE38-45A8-990A-4770A480D1BF", versionEndExcluding: "1.0.3.50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", matchCriteriaId: "814A0114-9A1D-4EA0-9AF4-6968514E4F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:dc112a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0D989E9B-5626-4238-877A-FFB0FC1C6352", versionEndExcluding: "1.0.0.48", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:dc112a:-:*:*:*:*:*:*:*", matchCriteriaId: "F87FFC46-137D-45B8-B437-F15565FB33D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:dgn2200v4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE1AC249-D64C-4E61-A22A-1498712D2758", versionEndExcluding: "1.0.0.114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:dgn2200v4:-:*:*:*:*:*:*:*", matchCriteriaId: "0BE59214-C8A1-4337-A54C-E4E8C149B241", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CFD91F26-5253-4A05-AB69-94CB2C416F83", versionEndExcluding: "1.0.0.66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*", matchCriteriaId: "1B048F71-70F1-4D9F-84E2-9F7340F6ADAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62EFA314-85C0-48CC-938E-E2BF42B16746", versionEndExcluding: "1.0.0.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*", matchCriteriaId: "A9D3B54B-33C0-4E50-AD2B-2097C612F288", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7EE6BC6-DEDA-4005-9E29-D66D0BC7E5C2", versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*", matchCriteriaId: "97740F5D-063E-424F-A0FE-09EBE1100975", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex2700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F81FC1BC-5186-4642-AD43-459C707B18CB", versionEndExcluding: "1.0.1.58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex2700:-:*:*:*:*:*:*:*", matchCriteriaId: "5341B659-DE7D-43F1-954D-82049CBE18AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex3110_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "16871358-4EF4-4517-BA05-6ED135691566", versionEndExcluding: "1.0.1.68", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex3110:-:*:*:*:*:*:*:*", matchCriteriaId: "3C254694-4C37-4C5E-BF1C-06EC09BDCA1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "953A4436-6F98-494C-B184-354E577F8E59", versionEndExcluding: "1.0.0.84", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*", matchCriteriaId: "CDAA5899-B73C-4690-853E-B5400F034BE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF7B1DD1-E197-461C-9537-C6D1DF2F6D7D", versionEndExcluding: "1.0.0.84", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*", matchCriteriaId: "CC5488D9-651C-4BAB-A141-06B816690D42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex3920_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33BDAF99-3E64-427E-ACAF-AEFB75401C72", versionEndExcluding: "1.0.0.84", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex3920:-:*:*:*:*:*:*:*", matchCriteriaId: "E576341B-2426-4F4D-8DF4-0A6D462656A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDB99B74-2E41-4986-96BB-B728ED32405B", versionEndExcluding: "1.0.0.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*", matchCriteriaId: "02E7CA7E-E6CA-4BAB-8F40-4731EA523D91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6100v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93543159-8F91-471D-BBE8-2956520DBD71", versionEndExcluding: "1.0.1.94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6100v2:-:*:*:*:*:*:*:*", matchCriteriaId: "4DCFF79A-8ACE-455B-90F3-FFC745E8BAD4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6110_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E7EBD31-5A65-442D-B7BD-B8A20BE37C20", versionEndExcluding: "1.0.1.68", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6110:-:*:*:*:*:*:*:*", matchCriteriaId: "04329A16-D96D-4E1D-8AC9-EA3882F1DC41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1AA1E29-118C-4299-91FA-2C8584EC6F6C", versionEndExcluding: "1.0.0.54", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*", matchCriteriaId: "8C6DFDB6-1D7A-459A-8D30-FD4900ED718B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B845CEBF-A8A2-474B-9094-43AA53560150", versionEndExcluding: "1.0.0.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*", matchCriteriaId: "305E295C-9C73-4798-A0BE-7973E1EE5EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6150v1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3141B266-38D7-43DB-B3CD-750D491F0AEA", versionEndExcluding: "1.0.0.46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6150v1:-:*:*:*:*:*:*:*", matchCriteriaId: "8FD610F2-64B7-4141-A387-69A2A97C20CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6150v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9B1AB33-CF18-4774-81F9-7ADA5819F8E8", versionEndExcluding: "1.0.1.94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6150v2:-:*:*:*:*:*:*:*", matchCriteriaId: "5828F04B-E373-4E4F-942D-08CCA038418C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6200v1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34961F45-369E-4344-A498-CF822A1503F9", versionEndExcluding: "1.0.3.94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6200v1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA1A7496-E8F3-48CA-965B-367B3C33F962", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB1C84E8-B947-4850-9D66-E306557DC316", versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6250:-:*:*:*:*:*:*:*", matchCriteriaId: "B7694D0C-2CC6-4A6E-A251-5CBFC67D2AA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CFA90DB-6949-4743-9B63-F1E73B28C7D0", versionEndExcluding: "1.0.2.152", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1289BBB4-1955-46A4-B5FE-BF11153C24F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6400v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22C5E2C9-E8DA-478A-B3B1-2C0038B5D560", versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6400v2:-:*:*:*:*:*:*:*", matchCriteriaId: "5882095F-B22A-4937-BA08-6640140F10AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6410_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DD3A7D2-75CE-4C67-AAE2-75F09653DFA7", versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6410:-:*:*:*:*:*:*:*", matchCriteriaId: "C63267D8-4632-4D14-B39C-BEEC62AD8F87", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex6920_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FF964D1-1FCE-467B-8B7F-8189CDF728D4", versionEndExcluding: "1.0.0.54", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex6920:-:*:*:*:*:*:*:*", matchCriteriaId: "65914D7F-39EA-489B-8DE7-8547AFC05F64", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A096742-1FFA-4C19-B697-EC5154411CF2", versionEndExcluding: "1.0.1.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*", matchCriteriaId: "9F45B620-60B8-40F3-A055-181ADD71EFFF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79610A3C-B1B8-4E1A-B46B-25F58670A759", versionEndExcluding: "1.0.2.152", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*", matchCriteriaId: "F285D60D-A5DA-4467-8F79-15EF8135D007", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7300v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3B1295F-3207-4DF4-BA5B-0DE7AB289636", versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7300v2:-:*:*:*:*:*:*:*", matchCriteriaId: "0A88D2A3-3B22-4639-94E9-69CE80F37392", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7320_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EE4BFF4-42DA-4A09-892E-6FBBE72B28A6", versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7320:-:*:*:*:*:*:*:*", matchCriteriaId: "A1D4DF51-84EA-4296-9E06-CE5E1F4A53D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B59B0C17-2714-48E8-8911-E72488CE32E3", versionEndExcluding: "1.0.0.68", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", matchCriteriaId: "44336289-F9DA-4779-8C1A-0221E29E2E2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6566C37A-252E-4301-952E-5C6F19F42326", versionEndExcluding: "1.0.0.210", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*", matchCriteriaId: "0D140E3B-9AE5-473A-82DE-9B9DBAE4C34A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "456DA66C-6B99-4D0D-8F32-952905F9C752", versionEndExcluding: "1.0.1.224", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*", matchCriteriaId: "8D9781C9-799A-4BDA-A027-987627A01633", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7658849-0743-487B-803F-D49680EDF185", versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", matchCriteriaId: "69A79475-37BE-47BD-A629-DCEF22500B0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E18CCBB-46CD-423D-AA66-36F223EFD6E6", versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB3ECD-2F0B-4625-A1DB-F6CEFC46E277", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07A1D7A9-29E9-4B1D-90DB-24E0967C9BC7", versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", matchCriteriaId: "F003F064-591C-4D7C-9EC4-D0E553BC6683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F898DC9-9250-47DF-844C-F7308365135B", versionEndExcluding: "1.0.0.70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", matchCriteriaId: "D18D2CCD-424F-41D5-919B-E22B9FA68D36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79B24229-6AC2-489D-B542-4DAA7E630180", versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", matchCriteriaId: "B131B5C8-CB7F-433B-BA32-F05CE0E92A66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B5B842D-2275-4968-997B-A70A67CBDBEC", versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*", matchCriteriaId: "C91CADFA-59DB-4B6C-A914-848884F4A4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CE369F2-053B-4F67-B295-54EE41C6C4DA", versionEndExcluding: "1.0.4.42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", matchCriteriaId: "321BE843-52C4-4638-A321-439CA7B3A6F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23D4F7E6-C042-434E-87B8-55DB18B08B0A", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", matchCriteriaId: "3C395D49-57F9-4BC1-8619-57127355B86B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6300v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD8455EE-AFAD-445D-910B-E8D9F02E8B1B", versionEndExcluding: "1.0.4.42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6300v2:-:*:*:*:*:*:*:*", matchCriteriaId: "7909744D-FE9B-49D1-ADB3-029CCC432A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6524B85E-23AC-4983-8331-96E12899B773", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:*", matchCriteriaId: "D621D26D-B144-424A-A9CB-19488399ACC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9F105F6F-ECD3-411D-924E-94BCF036C1EA", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*", matchCriteriaId: "4B302909-29CF-4E53-9CCB-8664D3FCB03A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6400v1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C48E07DA-A6D2-4035-BC2B-DC257148A259", versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6400v1:-:*:*:*:*:*:*:*", matchCriteriaId: "39608E61-7E2C-49AA-9719-A40095B1C8A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E32C097-6EDF-4C81-A375-028DB67B6231", versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", matchCriteriaId: "AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6700v1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "715A8158-B6A6-43FF-A0C0-0871EAB07667", versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6700v1:-:*:*:*:*:*:*:*", matchCriteriaId: "A4187FD4-8045-4C00-A8F2-D37B5549E716", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C5AB644-B80D-48A3-B794-C483FEFAFDED", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*", matchCriteriaId: "C9793286-86D2-43BF-B9B8-823C05BCAE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCCFD041-9413-4E37-8C4D-F50D1B10582B", versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", matchCriteriaId: "C88DA385-5FAE-49EC-80D6-78F81E7EEC16", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8956A99-1071-42A7-8984-D7134E755CBF", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", matchCriteriaId: "09404083-B00B-4C1F-8085-BC242E625CA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8956A99-1071-42A7-8984-D7134E755CBF", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", matchCriteriaId: "09404083-B00B-4C1F-8085-BC242E625CA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3408536D-FC77-48C5-AD15-C5A170D7417C", versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", matchCriteriaId: "598B48C5-4706-4431-8C5A-DA496DD1052F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1D59AC0-2859-46C0-B050-3BB8E3E9CB06", versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", matchCriteriaId: "0794BB7C-1BCF-4F08-8EB2-9C3B150C105A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61DE3850-1661-43D1-9E52-31E2E01979EE", versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", matchCriteriaId: "C41908FF-AE64-4949-80E3-BEE061B2DA8A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02672757-31FD-4338-AF2C-63FD1D7C1A19", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FC6398-60A5-4003-A294-C96AE6DBCED5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D208F2CA-DB20-4C82-8FFF-B99EBFE29713", versionEndExcluding: "1.0.11.106", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", matchCriteriaId: "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C6F506A-464D-4BDE-8F9B-D537D3C7E137", versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", matchCriteriaId: "DFE55F4D-E98B-46D3-B870-041141934CD1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8841DA90-D1B1-40EB-809D-14C014337AAB", versionEndExcluding: "1.0.0.56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", matchCriteriaId: "366FA778-3C2A-42AF-9141-DAD7043B406C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02279B20-D951-46CE-B339-452BC585A4F3", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7200:-:*:*:*:*:*:*:*", matchCriteriaId: "FECB83F9-D417-4FD3-B293-87BC177E3AEB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B452611A-43C5-401B-95BD-189020B5C65C", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7350:-:*:*:*:*:*:*:*", matchCriteriaId: "AFD1A65C-F10F-4C52-8B6D-69992E512EB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "237C68C0-C2A9-4F71-9E08-547F2A317CBC", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7400:-:*:*:*:*:*:*:*", matchCriteriaId: "1F68AC3B-A31F-4AB0-89E9-BFFDE427AD3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63697E3A-AAA3-42E7-8116-93C6548D3AB7", versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*", matchCriteriaId: "6DA5420D-DD64-4A9C-9B5F-784F0ED2B464", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7500v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C745B393-CC8D-4F88-A6EB-2788E1A4BAF9", versionEndExcluding: "1.0.3.48", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7500v2:-:*:*:*:*:*:*:*", matchCriteriaId: "2BCA6487-57EC-4630-884F-820BBFE25843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C393DBF4-8281-4611-B591-CDB9DF0AA958", versionEndExcluding: "1.0.2.74", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", matchCriteriaId: "17CF7445-6950-45FE-9D1A-E23F63316329", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4171EB00-3664-43D5-9B62-A3538C358142", versionEndExcluding: "1.0.5.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*", matchCriteriaId: "DAF94D73-B6D0-4334-9A41-83AA92B7C6DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9800CB2-C14A-406B-B1FF-B1B62862EBDB", versionEndExcluding: "1.0.4.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", matchCriteriaId: "C484840F-AF30-4B5C-821A-4DB9BE407BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44537647-E0B2-477D-98A5-7EA850BF3321", versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D6A70D-66AF-4064-9F1B-4358D4B1F016", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA8D0327-0A72-44EC-9CC2-6CAF6A0C08B2", versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", matchCriteriaId: "091CEDB5-0069-4253-86D8-B9FE17CB9F24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F030129E-95C6-4C31-92A6-DABCDC1B534B", versionEndExcluding: "1.0.4.58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", matchCriteriaId: "5B39F095-8FE8-43FD-A866-7B613B495984", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B377E02-0228-4A2F-90F3-A82E7E964B37", versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", matchCriteriaId: "F7EF872D-2537-4FEB-8799-499FC9D44339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6324787-AE71-423A-B853-8B22CA3A5294", versionEndExcluding: "1.0.2.134", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", matchCriteriaId: "7A9B77E7-7439-48C6-989F-5E22CB4D3044", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72C4B203-565A-43BC-9800-274060CE23F2", versionEndExcluding: "1.0.2.134", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", matchCriteriaId: "63500DE4-BDBD-4F86-AB99-7DB084D0B912", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57314D03-64B1-4973-9D36-5D22A71DBCBB", versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", matchCriteriaId: "0F859165-8D89-4CDD-9D48-9C7923D2261F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DCE56F2-5A45-4B31-99EF-1D8455C71E5C", versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", matchCriteriaId: "D74F1BFC-562E-4E7D-BBAB-2F8B593B5A57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B697A877-214C-4701-AA9B-FE9C23FDBCEB", versionEndExcluding: "1.0.1.136", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", matchCriteriaId: "1742BD56-84E4-40E1-8C04-098B3715161E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC5225D5-96AD-43EE-BAA3-37B7FEF97E86", versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", matchCriteriaId: "B624B4D3-BCF4-4F95-B401-A88BEC3145A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33505A97-35DB-4EFD-9D47-EA03057C8FFD", versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", matchCriteriaId: "7038703C-C79D-4DD4-8B16-E1A5FC6694C0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29FB835A-73C6-4F5D-A0F0-C37914B706E7", versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", matchCriteriaId: "58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD0FE36F-5D34-4872-8A2F-DC5B4710E807", versionEndExcluding: "1.0.3.80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:*", matchCriteriaId: "4201E4D6-4DDF-4EF3-902A-960DFFF7C9A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "785CFF3A-013C-4068-B98E-9B0FAA02BB33", versionEndExcluding: "1.0.3.80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*", matchCriteriaId: "13D54346-4B03-4296-B050-04EB8CFCA732", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A3B894E-E712-477A-9960-30AFAB2C35CF", versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", matchCriteriaId: "4B08BD69-CDCC-4CEB-B887-4E47D2B45D26", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A71AE85C-74C4-42C1-BF54-89B6EC38C707", versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", matchCriteriaId: "C430976E-24C0-4EA7-BF54-F9C188AB9C01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADDF0077-E02C-4DDA-A84E-DF3A0237FC66", versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", matchCriteriaId: "1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81DF924F-FDA4-4588-B8A3-6F18ABBD4976", versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", matchCriteriaId: "06B5A85C-3588-4263-B9AD-4E56D3F6CB16", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9EC30751-F447-45A7-8C57-B73042869EA5", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*", matchCriteriaId: "D5465A78-4826-4F72-9CBE-528CBF286A79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8246B8D3-8455-43B1-B0FA-F677B8FF84F5", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5DADAA79-9A5C-4B6F-A58D-704ACD1C3334", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28DA498C-B466-422E-BAD2-A1F9A15B157F", versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*", matchCriteriaId: "32BAB5C0-F645-4A90-833F-6345335FA1AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E72FDDB4-0802-467B-A255-06C8CE1A0B92", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", matchCriteriaId: "E6C9F31C-3E12-4787-9C9B-14883D9D152A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C80BEFF8-7094-4F21-B9E7-EE5C8B9DF3B3", versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", matchCriteriaId: "AE5DBD66-9C2A-4EFF-87AB-03E791D584B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04F03BE5-1440-4BC4-B902-97E702ED0ADF", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", matchCriteriaId: "14FC7F5B-7E4F-4A68-8427-D1F553EBE8CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09631703-25CD-40CB-80A8-AADD43939507", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", matchCriteriaId: "12DDD83C-6FF1-433F-ACA1-7B4B147F9A8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01A3914A-ABAC-4227-BCA1-DB0AAD559494", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", matchCriteriaId: "A9E20E59-2B1E-4E43-A494-2C20FD716D4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A32769CF-7D0A-4A3F-AF20-6202CA0C6870", versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", matchCriteriaId: "6FDCDE39-0355-43B9-BF57-F3718DA2988D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0E3BFCB-BFF8-4722-BE48-5FA93CACD3AD", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA66D07-D017-49D6-8E72-5C48E940DE1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39D6318D-F5A2-4469-B508-075F2825F0FA", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", matchCriteriaId: "B2CAEA32-6934-4743-9E6B-22D52AC5E7F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F44708A-C946-4E0F-9D6C-A91AFB4C9EF3", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", matchCriteriaId: "3BCFD959-D522-4FA0-AD01-2937DAEE1EDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDD03FFF-ECAF-4527-A195-559DF479A0F2", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", matchCriteriaId: "A45832BD-114D-42F1-B9F1-7532496D30A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05A46FA9-5DC8-4408-B4C2-AD5F1CABE7C1", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", matchCriteriaId: "C13F5C69-FA9B-472A-9036-0C2967BDCDE9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C144D71-6C10-44CD-BFF9-907A92F0432C", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", matchCriteriaId: "B529194C-C440-4BC3-850F-0613FC548F86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F5C6DF5F-FEFB-4A30-87CC-379E726AE181", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk842:-:*:*:*:*:*:*:*", matchCriteriaId: "0E9B19B2-5FF1-4C85-8504-C33C34F072B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "451C5603-927A-4EB9-BF9D-150FE16A48F8", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*", matchCriteriaId: "4489CB05-A1C0-408C-8D8C-56EE98CA20E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B22B149-BD16-42A0-BB1D-DEF483F6B5E1", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*", matchCriteriaId: "84AEA27B-8BEA-4E83-819A-FDAC1881928F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B66A716A-7EC5-4F9B-853A-36C0D1AA3BFE", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", matchCriteriaId: "14F257FE-31CE-4F74-829D-29407D74ADF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE13548D-0A26-45C1-8424-D4705EB105EA", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", matchCriteriaId: "D92E4C8E-222A-476C-8273-F7171FC61F0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "041D94DE-78C9-475C-9FAE-0B081C69B55F", versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", matchCriteriaId: "221CA950-E984-44CD-9E1B-3AADE3CEBE52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs40v_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4187AE9D-C676-4C41-8DFF-8FDC65D2475C", versionEndExcluding: "2.5.1.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs40v:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D05F28-47A2-46AE-992E-132B34F6194B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs40v-200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCFCED24-A687-4C5E-BE2E-60C2189254CF", versionEndExcluding: "1.0.0.46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs40v-200:-:*:*:*:*:*:*:*", matchCriteriaId: "935C7519-678D-4C40-BD35-3F281890C7C0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs50y_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9E75105-CB35-4983-8CC0-98699AAA63BE", versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs50y:-:*:*:*:*:*:*:*", matchCriteriaId: "27F93A76-6EFF-4DA6-9129-4792E2C125D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbw30_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "993FD563-493C-460C-B379-E02A90295434", versionEndExcluding: "2.5.0.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbw30:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA73D22-970D-45F2-81F3-9576C04CCC94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "921A8CFC-D86E-4674-998E-31F4F956B5DC", versionEndExcluding: "1.5.0.48", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", matchCriteriaId: "2700644E-0940-4D05-B3CA-904D91739E58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:wn2500rpv2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9FCAF1C-DB77-402B-98D2-8C3FE7DBA8FF", versionEndExcluding: "1.0.1.56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:wn2500rpv2:-:*:*:*:*:*:*:*", matchCriteriaId: "65FACC9E-3E0E-4416-9280-706F4FCE436A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:wn3000rpv3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E605C33E-0339-4248-9010-D1728C47861A", versionEndExcluding: "1.0.2.86", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:wn3000rpv3:-:*:*:*:*:*:*:*", matchCriteriaId: "958243A2-6829-464F-80EA-7DD5B6F0DD7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:wn3500rpv1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F357E3F-EDEB-4110-80AD-2061BB9CA066", versionEndExcluding: "1.0.0.28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:wn3500rpv1:-:*:*:*:*:*:*:*", matchCriteriaId: "F68F9615-B36A-45BA-8296-390321C050C0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:wndr3400v3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6803A2E5-5BCE-4DE6-A0EB-3463C81FAD0C", versionEndExcluding: "1.0.1.32", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:wndr3400v3:-:*:*:*:*:*:*:*", matchCriteriaId: "37F227D8-332F-4D24-BAEA-AA5DB3E3EC95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:wnr1000v3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5464DA45-2B33-430F-A16E-B1FE072B1376", versionEndExcluding: "1.0.2.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:wnr1000v3:-:*:*:*:*:*:*:*", matchCriteriaId: "252E5C7B-EF02-4374-A43E-02FAA9E697D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:wnr2000v2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01374C4A-4D12-4E77-AF7C-459C32C3579B", versionEndExcluding: "1.2.0.12", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*", matchCriteriaId: "31247E55-E754-46D0-9A46-B0D319C21221", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D71EDB94-370B-46C3-A14E-3F3FB130DD49", versionEndExcluding: "1.0.3.50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", matchCriteriaId: "5590CF28-B88A-4755-904B-1BC1778FBEDD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "051E8D2A-0EB0-43A7-9AAA-8519B8CC7FE0", versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*", matchCriteriaId: "66B9CE4D-D1EC-4F55-8226-D159CF5F3AB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BCFB551-95C6-4EEF-83F0-4246F67E6668", versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*", matchCriteriaId: "9E203D92-F97B-4F5B-B395-3A5DEDBF1C1C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89AB672D-DD24-483E-B69D-7E46AF199483", versionEndExcluding: "1.0.1.34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*", matchCriteriaId: "E12892C8-5E01-49A6-BF47-09D630377093", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D6000 before 1.0.0.80, D6220 before 1.0.0.60, D6400 before 1.0.0.94, D7000v2 before 1.0.0.62, D7800 before 1.0.3.48, D8500 before 1.0.3.50, DC112A before 1.0.0.48, DGN2200v4 before 1.0.0.114, DM200 before 1.0.0.66, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX2700 before 1.0.1.58, EX3110 before 1.0.1.68, EX3700 before 1.0.0.84, EX3800 before 1.0.0.84, EX3920 before 1.0.0.84, EX6000 before 1.0.0.44, EX6100v2 before 1.0.1.94, EX6110 before 1.0.1.68, EX6120 before 1.0.0.54, EX6130 before 1.0.0.36, EX6150v1 before 1.0.0.46, EX6150v2 before 1.0.1.94, EX6200v1 before 1.0.3.94, EX6250 before 1.0.0.128, EX6400 before 1.0.2.152, EX6400v2 before 1.0.0.128, EX6410 before 1.0.0.128, EX6920 before 1.0.0.54, EX7000 before 1.0.1.90, EX7300 before 1.0.2.152, EX7300v2 before 1.0.0.128, EX7320 before 1.0.0.128, EX7500 before 1.0.0.68, EX7700 before 1.0.0.210, EX8000 before 1.0.1.224, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6250 before 1.0.4.42, R6260 before 1.1.0.76, R6300v2 before 1.0.4.42, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400v1 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700v1 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900 before 1.0.2.16, R6900P before 1.3.2.124, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7100LG before 1.0.0.56, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7500v2 before 1.0.3.48, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8300 before 1.0.2.134, R8500 before 1.0.2.134, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.5.24, RAX35 before 1.0.3.80, RAX40 before 1.0.3.80, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.38, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBS40V before 2.5.1.6, RBS40V-200 before 1.0.0.46, RBS50Y before 2.6.1.40, RBW30 before 2.5.0.4, RS400 before 1.5.0.48, WN2500RPv2 before 1.0.1.56, WN3000RPv3 before 1.0.2.86, WN3500RPv1 before 1.0.0.28, WNDR3400v3 before 1.0.1.32, WNR1000v3 before 1.0.2.78, WNR2000v2 before 1.2.0.12, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34.", }, { lang: "es", value: "Determinados dispositivos NETGEAR están afectados por una configuración incorrecta de los ajustes de seguridad. Esto afecta a AC2100 versiones < 1.2.0.72, AC2400 versiones < 1.2.0.72, AC2600 versiones < 1.2.0.72, CBK40 versiones < 2.5.0.10, CBR40 versiones < 2.5.0.10, D6000 versiones < 1.0.0.80, D6220 versiones < 1.0.0.60, D6400 versiones < 1.0.0.94, D7000v2 versiones < 1.0.0.62, D7800 versiones < 1.0.3.48, D8500 versiones < 1.0.3.50, DC112A versiones < 1.0.0.48, DGN2200v4 versiones < 1.0.0.114, DM200 versiones < 1.0.0.66, EAX20 versiones < 1.0.0.36, EAX80 versiones < 1.0.1.62, EX2700 versiones < 1.0.1.58, EX3110 versiones < 1.0.1.68, EX3700 versiones < 1.0.0.84, EX3800 versiones < 1.0.0.84, EX3920 versiones < 1.0.0.84, EX6000 versiones < 1.0.0.44, EX6100v2 versiones < 1.0.1.94, EX6110 versiones < 1.0.1.68, EX6120 versiones < 1.0. 0.54, EX6130 versiones < 1.0.0.36, EX6150v1 versiones < 1.0.0.46, EX6150v2 versiones < 1.0.1.94, EX6200v1 versiones < 1.0.3.94, EX6250 versiones < 1.0.0.128, EX6400 versiones < 1.0.2.152, EX6400v2 versiones < 1.0.0.128, EX6410 versiones < 1.0.0.128, EX6920 versiones < 1.0.0.54, EX7000 versiones < 1.0.1.90, EX7300 versiones < 1.0.2.152, EX7300v2 versiones < 1.0.0.128, EX7320 versiones < 1.0.0.128, EX7500 versiones < 1.0.0.68, EX7700 versiones < 1.0.0.210, EX8000 antes e 1.0.1.224, MK62 versiones < 1.0.5.102, MR60 versiones < 1.0.5.102, MS60 versiones < 1.0.5.102, R6120 versiones < 1.0.0.70, R6220 versiones < 1.1.0.100, R6230 versiones < 1.1.0.100, R6250 versiones < 1.0.4.42, R6260 versiones < 1.1 .0.76, R6300v2 versiones < 1.0.4.42, R6330 versiones < 1.1.0.76, R6350 versiones < 1.1.0.76, R6400v1 versiones < 1.0.1.62, R6400v2 versiones < 1.0.4.98, R6700v1 versiones < 1.0.2.16, R6700v2 versiones < 1.2.0.72, R6700v3 versiones < 1.0.4.98, R6800 versiones < 1.2.0.72, R6800 antes 1.2.0.72, R6850 versiones < 1.1.0.76, R6900 versiones < 1.0.2.16, R6900P versiones < 1.3.2.124, R6900v2 versiones < 1.2.0.72, R7000 versiones < 1.0.11.106, R7000P versiones < 1.3.2.124, R7100LG versiones < 1.0.0.56, R7200 versiones < 1.2. 0.72, R7350 versiones < 1.2.0.72, R7400 versiones < 1.2.0.72, R7450 versiones < 1.2.0.72, R7500v2 versiones < 1.0.3.48, R7800 versiones < 1.0.2.74, R7850 versiones < 1.0.5.60, R7900 versiones < 1.0.4.26, R7900P versiones < 1.4.1.62, R7960P versiones < 1.4.1.62, R8000 versiones < 1.0.4.58, R8000P versiones < 1.4.1.62, R8300 versiones < 1.0.2.134, R8500 versiones < 1.0.2.134, R8900 versiones < 1.0.5.24, R9000 versiones < 1.0.5.24, RAX120 versiones < 1.0.1.136, RAX15 versiones < 1.0.1.64, RAX20 versiones < 1.0.1.64, RAX200 versiones < 1.0.5.24, RAX35 versiones < 1.0.3.80, RAX40 versiones < 1.0.3.80, RAX45 versiones < 1.0.2.64, RAX50 versiones < 1.0.2.64, RAX75 versiones < 1.0.3.102, RAX80 versiones < 1.0. 3.102, RB K12 versiones < 2.6.1.44, RBR10 versiones < 2.6.1.44, RBS10 versiones < 2.6.1.44, RBK20 versiones < 2.6.1.38, RBR20 versiones < 2.6.1.36, RBS20 versiones < 2.6.1.38, RBK40 versiones < 2.6.1.38, RBR40 versiones < 2.6.1.38, RBS40 antes 2.6.1.38, RBK50 versiones < 2.6.1.40, RBR50 versiones < 2.6.1.40, RBS50 versiones < 2.6.1.40, RBK752 versiones < 3.2.16.6, RBR750 versiones < 3.2.16.6, RBS750 versiones < 3.2.16.6, RBK842 versiones < 3.2.16.6, RBR840 versiones < 3.2. 16.6, RBS840 versiones < 3.2.16.6, RBK852 versiones < 3.2.16.6, RBR850 versiones < 3.2.16.6, RBS850 versiones < 3.2.16.6, RBS40V versiones < 2.5.1.6, RBS40V-200 versiones < 1.0.0.46, RBS50Y versiones < 2.6.1.40, RBW30 versiones < 2.5. 0.4, RS400 versiones < 1.5.0.48, WN2500RPv2 versiones < 1.0.1.56, WN3000RPv3 versiones < 1.0.2.86, WN3500RPv1 versiones < 1.0.0.28, WNDR3400v3 versiones < 1.0.1.32, WNR1000v3 versiones < 1.0.2.78, WNR2000v2 versiones < 1.2.0.12, XR30", }, ], id: "CVE-2020-35800", lastModified: "2024-11-21T05:28:08.620", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 9.7, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 9.5, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 9.4, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.5, source: "cve@mitre.org", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 9.4, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-12-30T00:15:14.410", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000062733/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0112", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000062733/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0112", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-202012-1175
Vulnerability from variot
plural NETGEAR An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1175", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "d6000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.80", }, { model: "ex7300v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.128", }, { model: "ex3110", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.68", }, { model: "rbr20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbr50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "cbk40", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.0.10", }, { model: "r7400", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "ex7300", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.152", }, { model: "rbs850", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rbk752", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "d7000v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.62", }, { model: "rax80", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.102", }, { model: "cbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.0.10", }, { model: "rbs20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "dc112a", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.48", }, { model: "r7850", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.60", }, { model: "rbs840", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "eax20", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.36", }, { model: "wn3500rpv1", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.28", }, { model: "rax50", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.64", }, { model: "rbs40v-200", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.46", }, { model: "r6700v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "ex6150v1", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.46", }, { model: "r7800", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.74", }, { model: "xr700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.34", }, { model: "ex6110", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.68", }, { model: "rax35", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.80", }, { model: "rbr850", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "r8500", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.134", }, { model: "r6300v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.42", }, { model: "r6700v3", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.98", }, { model: "r8000p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.62", }, { model: "r7000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.11.106", }, { model: "r7000p", scope: "lt", trust: 1, vendor: "netgear", version: "1.3.2.124", }, { model: "r6900", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.16", }, { model: "rbk20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rax120", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.136", }, { model: "d6400", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.94", }, { model: "r6260", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "xr450", scope: "lt", trust: 1, vendor: "netgear", version: "2.3.2.66", }, { model: "ex8000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.224", }, { model: "r6400v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.98", }, { model: "wnr2000v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.12", }, { model: "ex6150v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.94", }, { model: "ex2700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.58", }, { model: "r7900p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.62", }, { model: "ex7700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.210", }, { model: "rax45", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.64", }, { model: "dm200", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.66", }, { model: "rbs50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "r7960p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.62", }, { model: "ex6100v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.94", }, { model: "ms60", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.102", }, { model: "wndr3400v3", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.32", }, { model: "ac2400", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r7450", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r7900", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.26", }, { model: "rbr10", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "rbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "wn3000rpv3", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.86", }, { model: "ex3700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.84", }, { model: "eax80", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.62", }, { model: "r6230", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.100", }, { model: "r6800", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r6900p", scope: "lt", trust: 1, vendor: "netgear", version: "1.3.2.124", }, { model: "d8500", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.50", }, { model: "rs400", scope: "lt", trust: 1, vendor: "netgear", version: "1.5.0.48", }, { model: "rbs750", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "mr60", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.102", }, { model: "rbs50y", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "r7350", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "ex6200v1", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.94", }, { model: "r6220", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.100", }, { model: "r8300", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.134", }, { model: "r6400v1", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.62", }, { model: "ex7320", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.128", }, { model: "rax20", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.64", }, { model: "mk62", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.102", }, { model: "ex6130", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.36", }, { model: "r6330", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "ex6410", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.128", }, { model: "ac2100", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "ex3800", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.84", }, { model: "d7800", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.48", }, { model: "r6120", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.70", }, { model: "r7500v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.48", }, { model: "r6250", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.42", }, { model: "r6850", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "rbs40v", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.1.6", }, { model: "rax40", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.80", }, { model: "rbk50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbr750", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "ex7500", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.68", }, { model: "ex6250", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.128", }, { model: "wnr1000v3", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.78", }, { model: "r8900", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.24", }, { model: "rbr840", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax75", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.102", }, { model: "rbw30", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.0.4", }, { model: "ex6000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.44", }, { model: "rbk842", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "ex6120", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.54", }, { model: "r8000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.58", }, { model: "r9000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.24", }, { model: "rbs10", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "r7100lg", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.56", }, { model: "rbs40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rax200", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.24", }, { model: "ac2600", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "rbk852", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax15", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.64", }, { model: "r7200", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "xr300", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.50", }, { model: "ex6400", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.152", }, { model: "ex6920", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.54", }, { model: "d6220", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.60", }, { model: "ex7000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.90", }, { model: "dgn2200v4", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.114", }, { model: "ex3920", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.84", }, { model: "ex6400v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.128", }, { model: "wn2500rpv2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.56", }, { model: "r6350", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "xr500", scope: "lt", trust: 1, vendor: "netgear", version: "2.3.2.66", }, { model: "r6900v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "rbk12", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "r6700v1", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.16", }, { model: "d6000", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ac2600", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "d7000v2", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ac2400", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "d6220", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "d7800", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ac2100", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbk40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "d6400", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbr40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "NVD", id: "CVE-2020-35800", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.80", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.60", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.94", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.48", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.50", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:dc112a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.48", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:dc112a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:dgn2200v4_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.114", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:dgn2200v4:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex2700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.58", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex2700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex3110_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.68", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex3110:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.84", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.84", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex3920_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.84", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex3920:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6100v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.94", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6100v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6110_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.68", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6110:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.54", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6150v1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.46", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6150v1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6150v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.94", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6150v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6200v1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.94", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6200v1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6250_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.152", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6400v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6400v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6410_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6410:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6920_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.54", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6920:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.90", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.152", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7300v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7300v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7320_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.128", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7320:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.68", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.210", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.224", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.70", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.42", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6300v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.42", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6300v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6400v1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6400v1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6700v1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6700v1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.11.106", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.56", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7350:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7500v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.48", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7500v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.74", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.60", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.26", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.58", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.134", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.134", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.136", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.80", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.80", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk842:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs40v_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.1.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs40v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs40v-200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.46", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs40v-200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs50y_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs50y:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbw30_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.0.4", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbw30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.5.0.48", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:wn2500rpv2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.56", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:wn2500rpv2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:wn3000rpv3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.86", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:wn3000rpv3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:wn3500rpv1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.28", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:wn3500rpv1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:wndr3400v3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.32", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:wndr3400v3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:wnr1000v3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.78", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:wnr1000v3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:wnr2000v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.12", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.50", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.34", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-35800", }, ], }, cve: "CVE-2020-35800", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 9.7, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, impactScore: 9.5, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 9.7, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2020-35800", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "LOW", baseScore: 9.4, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, impactScore: 5.5, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 2, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "OTHER", availabilityImpact: "Low", baseScore: 9.4, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2020-015016", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-35800", trust: 1.8, value: "CRITICAL", }, { author: "cve@mitre.org", id: "CVE-2020-35800", trust: 1, value: "CRITICAL", }, { author: "CNNVD", id: "CNNVD-202012-1740", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "NVD", id: "CVE-2020-35800", }, { db: "NVD", id: "CVE-2020-35800", }, { db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural NETGEAR An unspecified vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state.", sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, ], trust: 0.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-35800", trust: 2.4, }, { db: "JVNDB", id: "JVNDB-2020-015016", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202012-1740", trust: 0.6, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "NVD", id: "CVE-2020-35800", }, { db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, id: "VAR-202012-1175", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.40763064986486497, }, last_update_date: "2023-12-18T12:27:05.432000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Security Advisory for Security Misconfiguration on Some Routers, Range Extenders, and Orbi WiFi Systems, PSV-2020-0112", trust: 0.8, url: "https://kb.netgear.com/000062733/security-advisory-for-security-misconfiguration-on-some-routers-range-extenders-and-orbi-wifi-systems-psv-2020-0112", }, { title: "Certain NETGEAR devices Repair measures for default configuration problems", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=138265", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "NVD", id: "CVE-2020-35800", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://kb.netgear.com/000062733/security-advisory-for-security-misconfiguration-on-some-routers-range-extenders-and-orbi-wifi-systems-psv-2020-0112", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-35800", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "NVD", id: "CVE-2020-35800", }, { db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, { db: "NVD", id: "CVE-2020-35800", }, { db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-09-07T00:00:00", db: "JVNDB", id: "JVNDB-2020-015016", }, { date: "2020-12-30T00:15:14.410000", db: "NVD", id: "CVE-2020-35800", }, { date: "2020-12-29T00:00:00", db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-09-07T09:06:00", db: "JVNDB", id: "JVNDB-2020-015016", }, { date: "2021-01-04T14:55:12.933000", db: "NVD", id: "CVE-2020-35800", }, { date: "2021-01-12T00:00:00", db: "CNNVD", id: "CNNVD-202012-1740", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202012-1740", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural NETGEAR Vulnerabilities in devices", sources: [ { db: "JVNDB", id: "JVNDB-2020-015016", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Default configuration problem", sources: [ { db: "CNNVD", id: "CNNVD-202012-1740", }, ], trust: 0.6, }, }
var-202102-0332
Vulnerability from variot
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076. NETGEAR Orbi Has OS A command injection vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-11076 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0332", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "rbk22 router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbr20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbr50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk20 router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk50v", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk44 router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk23 satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk40 router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbs20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk20w", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk43s satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk43 router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "cbk40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk14", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "cbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk44 satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbs10", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "rbk20 satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "cbk43", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbs40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk43s router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk22 satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "ex8000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.224", }, { model: "ex6200", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.82", }, { model: "rbk23 router", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk43 satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk33", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk40 satellite", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "rbk52w", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "ex7700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.210", }, { model: "rbk30", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbs50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk23w", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbr10", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "rbk15", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "rbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbk50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk13", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "rbk12", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "cbk43", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rbk12", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbr40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ex7700", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ex6200", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ex8000", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbk40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rbk15", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rbk13", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rbk14", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "orbi", scope: null, trust: 0.7, vendor: "netgear", version: null, }, ], sources: [ { db: "ZDI", id: "ZDI-20-1430", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "NVD", id: "CVE-2020-27861", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbk43_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbk43:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.82", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6200:v2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.210", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.224", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk13_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk13:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk14_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk14:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk15_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk15:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk20w_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk20w:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk23w_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk23w:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk20_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk20_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk22_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk22_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk23_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk23_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk23:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk30_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk33_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk33:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk40_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk40_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk43_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk43_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk43:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk43s_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk43s_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk43s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk44_router_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netgear:rbk44_satellite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk44:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk50v_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk50v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk52w_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk52w:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-27861", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Shaunak Mirani", sources: [ { db: "ZDI", id: "ZDI-20-1430", }, ], trust: 0.7, }, cve: "CVE-2020-27861", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", exploitabilityScore: 6.5, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Adjacent Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 8.3, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2020-27861", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", author: "zdi-disclosures@trendmicro.com", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "High", baseScore: 8.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2020-27861", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "LOW", attackVector: "ADJACENT", author: "ZDI", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, id: "CVE-2020-27861", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 0.7, userInteraction: "NONE", vectorString: "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-27861", trust: 1.8, value: "HIGH", }, { author: "zdi-disclosures@trendmicro.com", id: "CVE-2020-27861", trust: 1, value: "HIGH", }, { author: "ZDI", id: "CVE-2020-27861", trust: 0.7, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202102-1082", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2020-27861", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "ZDI", id: "ZDI-20-1430", }, { db: "VULMON", id: "CVE-2020-27861", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "NVD", id: "CVE-2020-27861", }, { db: "NVD", id: "CVE-2020-27861", }, { db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076. NETGEAR Orbi Has OS A command injection vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-11076 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", sources: [ { db: "NVD", id: "CVE-2020-27861", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "ZDI", id: "ZDI-20-1430", }, { db: "VULMON", id: "CVE-2020-27861", }, ], trust: 2.34, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-27861", trust: 3.2, }, { db: "ZDI", id: "ZDI-20-1430", trust: 3.2, }, { db: "JVNDB", id: "JVNDB-2020-015997", trust: 0.8, }, { db: "ZDI_CAN", id: "ZDI-CAN-11076", trust: 0.7, }, { db: "CNNVD", id: "CNNVD-202102-1082", trust: 0.6, }, { db: "VULMON", id: "CVE-2020-27861", trust: 0.1, }, ], sources: [ { db: "ZDI", id: "ZDI-20-1430", }, { db: "VULMON", id: "CVE-2020-27861", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "NVD", id: "CVE-2020-27861", }, { db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, id: "VAR-202102-0332", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.29699992500000005, }, last_update_date: "2023-12-18T13:17:59.292000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Security Advisory for Unauthenticated Command Injection Vulnerability on Some Extenders and Orbi WiFi Systems, PSV-2020-0301", trust: 0.8, url: "https://kb.netgear.com/000062507/security-advisory-for-unauthenticated-command-injection-vulnerability-on-some-extenders-and-orbi-wifi-systems-psv-2020-0301", }, { title: "NETGEAR has issued an update to correct this vulnerability.", trust: 0.7, url: "https://kb.netgear.com/000062507/security-advisory-for-unauthenticated-command-injection-vulnerability-on-some-extenders-and-orbi-wifi-systems", }, { title: "Netgear NETGEAR Fixes for operating system command injection vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=142366", }, { title: "", trust: 0.1, url: "https://github.com/f1tao/awesome-iot-security-resource ", }, ], sources: [ { db: "ZDI", id: "ZDI-20-1430", }, { db: "VULMON", id: "CVE-2020-27861", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-78", trust: 1, }, { problemtype: "OS Command injection (CWE-78) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "NVD", id: "CVE-2020-27861", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.5, url: "https://www.zerodayinitiative.com/advisories/zdi-20-1430/", }, { trust: 2.4, url: "https://kb.netgear.com/000062507/security-advisory-for-unauthenticated-command-injection-vulnerability-on-some-extenders-and-orbi-wifi-systems", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-27861", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/78.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://github.com/f1tao/awesome-iot-security-resource", }, ], sources: [ { db: "ZDI", id: "ZDI-20-1430", }, { db: "VULMON", id: "CVE-2020-27861", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "NVD", id: "CVE-2020-27861", }, { db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "ZDI", id: "ZDI-20-1430", }, { db: "VULMON", id: "CVE-2020-27861", }, { db: "JVNDB", id: "JVNDB-2020-015997", }, { db: "NVD", id: "CVE-2020-27861", }, { db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-12-15T00:00:00", db: "ZDI", id: "ZDI-20-1430", }, { date: "2021-02-12T00:00:00", db: "VULMON", id: "CVE-2020-27861", }, { date: "2021-10-29T00:00:00", db: "JVNDB", id: "JVNDB-2020-015997", }, { date: "2021-02-12T00:15:12.500000", db: "NVD", id: "CVE-2020-27861", }, { date: "2021-02-11T00:00:00", db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-12-15T00:00:00", db: "ZDI", id: "ZDI-20-1430", }, { date: "2021-03-23T00:00:00", db: "VULMON", id: "CVE-2020-27861", }, { date: "2021-10-29T09:04:00", db: "JVNDB", id: "JVNDB-2020-015997", }, { date: "2021-03-23T18:54:23.193000", db: "NVD", id: "CVE-2020-27861", }, { date: "2021-03-19T00:00:00", db: "CNNVD", id: "CNNVD-202102-1082", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-202102-1082", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "NETGEAR Orbi In OS Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2020-015997", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "operating system commend injection", sources: [ { db: "CNNVD", id: "CNNVD-202102-1082", }, ], trust: 0.6, }, }
var-202012-1194
Vulnerability from variot
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D7800 before 1.0.1.58, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RS400 before 1.5.0.48, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34. plural NETGEAR A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1194", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "rbr20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rbr50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "cbk40", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.0.10", }, { model: "r7400", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "rbs850", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rbk752", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax80", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.102", }, { model: "cbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.0.10", }, { model: "rbs20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "r7850", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.60", }, { model: "rbs840", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "eax20", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.36", }, { model: "rax50", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.64", }, { model: "r6700v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r7800", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.74", }, { model: "xr700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.34", }, { model: "r6400", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.62", }, { model: "rbr850", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rbk20", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "r6700v3", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.98", }, { model: "r8000p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.62", }, { model: "r7000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.11.106", }, { model: "r7000p", scope: "lt", trust: 1, vendor: "netgear", version: "1.3.2.124", }, { model: "r6900", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.16", }, { model: "rax120", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.136", }, { model: "r6260", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "r6900v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "rax200", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.102", }, { model: "xr450", scope: "lt", trust: 1, vendor: "netgear", version: "2.3.2.66", }, { model: "r6400v2", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.98", }, { model: "r7900p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.62", }, { model: "rax45", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.64", }, { model: "rbs50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "r7960p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.62", }, { model: "ms60", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.102", }, { model: "ac2400", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r7450", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r7900", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.26", }, { model: "rbr10", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "eax80", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.62", }, { model: "r6230", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.100", }, { model: "r6800", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r6900p", scope: "lt", trust: 1, vendor: "netgear", version: "1.3.2.124", }, { model: "rbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.36", }, { model: "rs400", scope: "lt", trust: 1, vendor: "netgear", version: "1.5.0.48", }, { model: "rbs750", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "mr60", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.102", }, { model: "r6700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.16", }, { model: "r7350", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r6220", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.100", }, { model: "rax20", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.64", }, { model: "mk62", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.102", }, { model: "r6330", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "r6120", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.70", }, { model: "ac2100", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "r6850", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "d7800", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.58", }, { model: "rbr750", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "ex7500", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.68", }, { model: "r8900", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.24", }, { model: "rbr840", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax75", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.102", }, { model: "rbk842", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "r8000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.4.58", }, { model: "r9000", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.5.24", }, { model: "rbs10", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "rbs40", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.38", }, { model: "ac2600", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "rbk852", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax15", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.64", }, { model: "r7200", scope: "lt", trust: 1, vendor: "netgear", version: "1.2.0.72", }, { model: "xr300", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.50", }, { model: "xr500", scope: "lt", trust: 1, vendor: "netgear", version: "2.3.2.66", }, { model: "r6350", scope: "lt", trust: 1, vendor: "netgear", version: "1.1.0.76", }, { model: "rbk50", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.40", }, { model: "rbk12", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.44", }, { model: "ac2400", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "mk62", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbk40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "d7800", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ex7500", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "eax20", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ac2600", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "eax80", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ac2100", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbr40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "NVD", id: "CVE-2020-35795", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.58", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.68", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.70", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.100", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.98", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.1.0.76", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.16", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.11.106", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.3.2.124", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7350:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.2.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.74", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.60", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.26", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.4.58", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.62", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.5.24", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.136", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.102", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.36", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.38", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.40", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk842:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.5.0.48", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.50", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.3.2.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.34", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-35795", }, ], }, cve: "CVE-2020-35795", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 7.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2020-35795", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 2, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "OTHER", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2020-015039", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-35795", trust: 1.8, value: "CRITICAL", }, { author: "cve@mitre.org", id: "CVE-2020-35795", trust: 1, value: "CRITICAL", }, { author: "CNNVD", id: "CNNVD-202012-1750", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "NVD", id: "CVE-2020-35795", }, { db: "NVD", id: "CVE-2020-35795", }, { db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D7800 before 1.0.1.58, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RS400 before 1.5.0.48, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34. plural NETGEAR A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", sources: [ { db: "NVD", id: "CVE-2020-35795", }, { db: "JVNDB", id: "JVNDB-2020-015039", }, ], trust: 1.62, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-35795", trust: 2.4, }, { db: "JVNDB", id: "JVNDB-2020-015039", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202012-1750", trust: 0.6, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "NVD", id: "CVE-2020-35795", }, { db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, id: "VAR-202012-1194", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.33538940590909083, }, last_update_date: "2023-12-18T12:16:40.737000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Security Advisory for Pre-Authentication Buffer Overflow on Some Routers, Range Extenders, and Orbi WiFi Systems, PSV-2020-0154", trust: 0.8, url: "https://kb.netgear.com/000062735/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-range-extenders-and-orbi-wifi-systems-psv-2020-0154", }, { title: "Certain NETGEAR devices Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=138129", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-120", trust: 1, }, { problemtype: "Classic buffer overflow (CWE-120) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "NVD", id: "CVE-2020-35795", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://kb.netgear.com/000062735/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-range-extenders-and-orbi-wifi-systems-psv-2020-0154", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-35795", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "NVD", id: "CVE-2020-35795", }, { db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, { db: "NVD", id: "CVE-2020-35795", }, { db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-09-08T00:00:00", db: "JVNDB", id: "JVNDB-2020-015039", }, { date: "2020-12-30T00:15:14.080000", db: "NVD", id: "CVE-2020-35795", }, { date: "2020-12-29T00:00:00", db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-09-08T08:43:00", db: "JVNDB", id: "JVNDB-2020-015039", }, { date: "2021-01-04T14:43:53.907000", db: "NVD", id: "CVE-2020-35795", }, { date: "2021-01-12T00:00:00", db: "CNNVD", id: "CNNVD-202012-1750", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202012-1750", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural NETGEAR Classic buffer overflow vulnerability in device", sources: [ { db: "JVNDB", id: "JVNDB-2020-015039", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202012-1750", }, ], trust: 0.6, }, }