Vulnerabilites related to netgear - dgnd3700
Vulnerability from fkie_nvd
Published
2020-04-28 17:15
Modified
2024-11-21 02:45
Summary
Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06.
Impacted products
Vendor Product Version
netgear ac1450_firmware *
netgear ac1450 -
netgear c6300_firmware *
netgear c6300 -
netgear d1500_firmware *
netgear d1500 -
netgear d3600_firmware *
netgear d3600 -
netgear d500_firmware *
netgear d500 -
netgear d6000_firmware *
netgear d6000 -
netgear d6100_firmware *
netgear d6100 -
netgear d6200_firmware *
netgear d6200 -
netgear d6200b_firmware *
netgear d6200b -
netgear d6300_firmware *
netgear d6300 -
netgear d6300b_firmware *
netgear d6300b -
netgear dgn1000_firmware *
netgear dgn1000 v3
netgear dgn2200_firmware *
netgear dgn2200 v1
netgear dgn2200_firmware *
netgear dgn2200 v3
netgear dgn2200_firmware *
netgear dgn2200 v4
netgear dgn2200b_firmware *
netgear dgn2200b v3
netgear dgn2200b_firmware *
netgear dgn2200b v4
netgear dgnd3700_firmware *
netgear dgnd3700 v1
netgear dgnd3700_firmware *
netgear dgnd3700 v2
netgear dgnd3700b_firmware *
netgear dgnd3700b v2
netgear jnr1010_firmware *
netgear jnr1010 v1
netgear jnr1010_firmware *
netgear jnr1010 v2
netgear jnr3300_firmware *
netgear jnr3300 -
netgear jr6100_firmware *
netgear jr6100 -
netgear jr6150_firmware *
netgear jr6150 -
netgear jwnr2000_firmware *
netgear jwnr2000 v5
netgear r2000_firmware *
netgear r2000 -
netgear r6050_firmware *
netgear r6050 -
netgear r6100_firmware *
netgear r6100 -
netgear r6200_firmware *
netgear r6200 -
netgear r6200_firmware *
netgear r6200 v2
netgear r6220_firmware *
netgear r6220 -
netgear r6250_firmware *
netgear r6250 -
netgear r6300_firmware *
netgear r6300 -
netgear r6300_firmware *
netgear r6300 v2
netgear r6700_firmware *
netgear r6700 -
netgear r7000_firmware *
netgear r7000 -
netgear r7500_firmware *
netgear r7500 -
netgear r7900_firmware *
netgear r7900 -
netgear r8000_firmware *
netgear r8000 -
netgear wgr614_firmware *
netgear wgr614 v10
netgear wndr3400_firmware *
netgear wndr3400 v2
netgear wndr3400_firmware *
netgear wndr3400 v3
netgear wndr3700_firmware *
netgear wndr3700 v3
netgear wndr3700_firmware *
netgear wndr3700 v4
netgear wndr3700_firmware *
netgear wndr3700 v5
netgear wndr4300_firmware *
netgear wndr4300 -
netgear wndr4300_firmware *
netgear wndr4300 v2
netgear wndr4500_firmware *
netgear wndr4500 v1
netgear wndr4500_firmware *
netgear wndr4500 v2
netgear wndr4500_firmware *
netgear wndr4500 v3
netgear wnr1000_firmware *
netgear wnr1000 v2
netgear wnr1000_firmware *
netgear wnr1000 v3
netgear wnr1000_firmware *
netgear wnr1000 v4
netgear wnr2000_firmware *
netgear wnr2000 v3
netgear wnr2000_firmware *
netgear wnr2000 v4
netgear wnr2000_firmware *
netgear wnr2000 v5
netgear wnr2200_firmware *
netgear wnr2200 -
netgear wnr2500_firmware *
netgear wnr2500 -
netgear wnr3500l_firmware *
netgear wnr3500l v2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:ac1450_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "32794415-73D5-4C63-BCAB-FA324BBCE850",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:ac1450:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4BA18B2-8234-4C26-B865-741D467C5EBE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:c6300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DC0FCBB-5F1B-417C-8E4B-FBD403CF2E38",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:c6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7185DE0B-B15C-417D-9AF5-FBF15F9C2241",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d1500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56141687-D086-4EEE-9F8A-C238CC26854E",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DC8809-C26D-48D8-9E12-228C3669B824",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B175146A-AA48-4A89-9712-E87BBB0B389F",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DE9D4E-3CDC-4552-A63F-DD5D95E23F63",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7FA616-CD66-488A-92ED-3F28954F9E45",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE070E3-C0B1-455F-83A9-5C60C489816F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D53F8CC0-F707-4F98-85CE-9A816BE39809",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EA344-FF99-4F27-9860-3C5BE07345A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D349BA3-DF82-4DD5-BDA6-6AB5F3B70BD3",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EFD1E86-F100-4E46-935D-903EB6FEFE9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22E4FA5-DB96-4946-86B1-0D18A3BEBB2A",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00E6A1B7-4732-4259-9B71-10FF0B56A16B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d6200b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFEBB6A6-EABA-4A04-8B49-3C9F64D7C5C6",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d6200b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60FAC76D-96D6-41FB-8EE8-C25F3CBB3307",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d6300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EC71979-23F7-4623-BE4A-82713E95DACD",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78542C95-85CC-43E5-9F0E-B12DDD5B79C4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:d6300b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "357F14D2-06B8-4BA5-9D7E-B334F59C7250",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:d6300b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B89703-CAFB-43F6-8880-90349F8ED856",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEFBB234-2155-45F8-933D-93E89EC1F54F",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn1000:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "430497AE-7C43-400E-9C70-001B2DA23B67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "769065AA-BC73-4674-87B0-3D514FEFDBEF",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200:v1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F50D834B-D7B3-43D6-8072-8992FBC8C97B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "769065AA-BC73-4674-87B0-3D514FEFDBEF",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "509F9F22-24E7-45E9-AB96-17F8B50813F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "769065AA-BC73-4674-87B0-3D514FEFDBEF",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200:v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "099184A0-F1C6-4C3F-9C3B-F0B9AC0D4D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5158CF4D-80FC-44FD-B9DA-442FA3A1A913",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200b:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A4EE9AB-F3DE-4EA8-8344-7F62288EC921",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5158CF4D-80FC-44FD-B9DA-442FA3A1A913",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200b:v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "25090794-A90C-40CD-8E95-87EC4E98B928",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgnd3700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "696689E8-E4C4-4A92-9D00-4C6B8CA80448",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgnd3700:v1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A5971C6-2F27-4715-BC9E-378B647611D8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgnd3700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "696689E8-E4C4-4A92-9D00-4C6B8CA80448",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgnd3700:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A8F0B8E-D3F2-43C9-8B12-43DE4226E826",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgnd3700b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E607B102-4151-4829-B5D5-779D096D620F",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgnd3700b:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6F2634F-EA5A-48CE-91BA-964C0B40AF8E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F19C07A-65D3-4FFF-9D11-58C2B4D7A531",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:jnr1010:v1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4196FE8-4491-442C-96A0-23495165D3B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F19C07A-65D3-4FFF-9D11-58C2B4D7A531",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCE79B3F-8667-43C9-962D-EE089428F144",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:jnr3300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5738544-7D8A-45AD-99F3-6F92C6886ACD",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:jnr3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CA12CC-48D8-4510-983C-8350A87CD5D2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:jr6100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30751D8C-301D-4C9F-8512-E887512CE388",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:jr6100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C1C81B4-033E-4F44-9D17-27B04FCF8EF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D67167E5-81D2-4892-AF41-CBB6271232D1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:jwnr2000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "86B79A3A-8A63-4BD5-9016-8C98AEF737A8",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:jwnr2000:v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D78543E-37A7-4829-9165-D0CF52DD4867",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r2000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D0BCC15-918E-4A31-A943-C5B72CB117E9",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r2000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B1D13C3-5663-447F-9FD9-71EBEC471DAF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "675EBB75-3DB8-45D7-9512-5D297C680750",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "363D4DEE-98B9-4294-B241-1613CAD1A3A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "067085C6-EA5C-430B-B81E-A5809BD047B0",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F44A123-B256-428B-98C2-17570F2F32DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBBDBEC-C896-4130-933B-150DB17662A3",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A466B29-3ADA-46D9-824C-8DF9160B7DD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBBDBEC-C896-4130-933B-150DB17662A3",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6200:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "719248B0-BE22-4836-A23E-FE9F7590FB0C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "717CDDCB-3DEB-4949-AAC8-D939D01A0858",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B131B5C8-CB7F-433B-BA32-F05CE0E92A66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "760BD171-837C-4D36-A4AF-551E926B53C0",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "321BE843-52C4-4638-A321-439CA7B3A6F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC7F9A44-CC92-4E00-A274-ADA08469F33F",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9597966A-B13C-4098-838B-EC9AA8DE443D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC7F9A44-CC92-4E00-A274-ADA08469F33F",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "10938043-F7DF-42C3-8C16-F92CAF8E5576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66DBD436-0DA8-4917-99EB-6A5D0C3D42D1",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21B27F11-4262-4CE1-8107-B365A7C152F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2356B7-389D-4612-8DBE-00C6AC35BD3D",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9866D7B9-622A-4B25-8CFA-D31AB4406A4F",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF3B3F26-401C-4ED0-B871-4B4F8521F369",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BC36898-99C5-4755-9C42-687EAC07013B",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C484840F-AF30-4B5C-821A-4DB9BE407BDB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BBF5B80-58EB-467E-8E07-6CB6C2E88BBC",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B39F095-8FE8-43FD-A866-7B613B495984",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wgr614_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A746A6A7-AFD5-41DC-B805-C1526CFD2E95",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wgr614:v10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B47B0897-A9B9-4568-84DD-C3CE0118B439",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2BF93E7-2E14-48C7-BD1A-9C5FC3451334",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3400:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "25187765-6842-4F6A-BF5E-B2E634A958A0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2BF93E7-2E14-48C7-BD1A-9C5FC3451334",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1992E44C-122C-41BC-8FDC-5F9EBEE1FB7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17D010FA-275D-4D34-8DB8-49BEA70AF6DA",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3700:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A239B4C0-0CD9-4632-A1E3-68B8E39692B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17D010FA-275D-4D34-8DB8-49BEA70AF6DA",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "257A5E68-8EDC-44F5-A85C-83A91C93CCE5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17D010FA-275D-4D34-8DB8-49BEA70AF6DA",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5B6CB8-D439-42D5-ACAE-6246874EA5F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "58CC514B-1570-4116-9E1F-289BD9DD5935",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1413C591-D066-4FA2-BEB1-6C60F8645F28",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "58CC514B-1570-4116-9E1F-289BD9DD5935",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4428B145-B86D-4709-BBA9-64BDE7D35A25",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3BC4526-3FCE-42D3-B34A-C32060B78AF7",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr4500:v1:*:*:*:*:*:*:*",
                     matchCriteriaId: "829C71CF-A1E7-456E-8230-8929BD7E867C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3BC4526-3FCE-42D3-B34A-C32060B78AF7",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr4500:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB00ECAD-7474-4D85-8248-D014E5808814",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3BC4526-3FCE-42D3-B34A-C32060B78AF7",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C31D6808-4103-4543-B7AB-84A79CD12006",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B45AE0-0FBF-478B-966F-B2B28C971C3C",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr1000:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "938F4D22-AEFC-4141-BC1C-101F835D4E77",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B45AE0-0FBF-478B-966F-B2B28C971C3C",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr1000:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D091D4-04EA-4564-A2CC-88E217A9FC08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B45AE0-0FBF-478B-966F-B2B28C971C3C",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8218868-273B-46DB-B636-D3F9A3768069",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCA254A9-B22D-44C5-9261-19AFBD2B2EE4",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr2000:v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C547734B-BF1A-4CD9-8FD8-9ECB3D15B0BA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCA254A9-B22D-44C5-9261-19AFBD2B2EE4",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr2000:v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2913468-C442-48A3-8AD9-A2F3CCDD7952",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCA254A9-B22D-44C5-9261-19AFBD2B2EE4",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "317F25FF-B3A2-4C68-888F-D2627C564867",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr2200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFCD5179-4D17-4187-BFFD-7FF080804D95",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94B74E4A-3E2F-4CB1-B33D-8618ED1C7E9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr2500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF1CD0F5-D109-460F-9417-1907A6368A8B",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr2500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA9EF618-6194-4127-BD60-FB0E645C8993",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDBCEE9B-9189-42DA-86D1-3FF6E4168127",
                     versionEndExcluding: "2017-01-06",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8DE4BFA-41DE-4748-ACC7-14362333A059",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06.",
      },
      {
         lang: "es",
         value: "Determinados dispositivos de NETGEAR están afectados por una exposición de contraseñas. Esto afecta a AC1450 hasta el 06-01-2017, C6300 hasta el 06-01-2017, D500 hasta el 06-01-2017, D1500 hasta el 06-01-2017, D3600 hasta el 06-01-2017, D6000 hasta el 06-01-2017, D6100 hasta el 06-01-2017, D6200 hasta el 06-01-2017, D6200B hasta el 06-01-2017, D6300B hasta el 06-01-2017, D6300 hasta el 06-01-2017, DGN1000v3 hasta el 06-01-2017, DGN2200v1 hasta el 06-01-2017, DGN2200v3 hasta el 06-01-2017, DGN2200V4 hasta el 06-01-2017, DGN2200Bv3 hasta el 06-01-2017, DGN2200Bv4 hasta el 06-01-2017, DGND3700v1 hasta el 06-01-2017, DGND3700v2 hasta el 06-01-2017, DGND3700Bv2 hasta el 06-01-2017, JNR1010v1 hasta el 06-01-2017, JNR1010v2 hasta el 06-01-2017, JNR3300 hasta el 06-01-2017, JR6100 hasta el 06-01-2017, JR6150 hasta el 06-01-2017, JWNR2000v5 hasta el 06-01-2017, R2000 hasta el 06-01-2017, R6050 hasta el 06-01-2017, R6100 hasta el 06-01-2017, R6200 hasta el 06-01-2017, R6200v2 hasta el 06-01-2017, R6220 hasta el 06-01-2017, R6250 hasta el 06-01-2017, R6300 hasta el 06-01-2017, R6300v2 hasta el 06-01-2017, R6700 hasta el 06-01-2017, R7000 hasta el 06-01-2017, R7900 hasta el 06-01-2017, R7500 hasta el 06-01-2017, R8000 hasta el 06-01-2017, WGR614v10 hasta el 06-01-2017, WNR1000v2 hasta el 06-01-2017, WNR1000v3 hasta el 06-01-2017, WNR1000v4 hasta el 06-01-2017, WNR2000v3 hasta el 06-01-2017, WNR2000v4 hasta el 06-01-2017, WNR2000v5 hasta el 06-01-2017, WNR2200 hasta el 06-01-2017, WNR2500 hasta el 06-01-2017, WNR3500Lv2 hasta el 06-01-2017, WNDR3400v2 hasta el 06-01-2017, WNDR3400v3 hasta el 06-01-2017, WNDR3700v3 hasta el 06-01-2017, WNDR3700v4 hasta el 06-01-2017, WNDR3700v5 hasta el 06-01-2017, WNDR4300 hasta el 06-01-2017, WNDR4300v2 hasta el 06-01-2017, WNDR4500v1 hasta el 06-01-2017, WNDR4500v2 hasta el 06-01-2017, and WNDR4500v3 hasta el 06-01-2017.",
      },
   ],
   id: "CVE-2016-11059",
   lastModified: "2024-11-21T02:45:24.220",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-04-28T17:15:12.460",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.netgear.com/27253/NETGEAR-Product-Vulnerability-Advisory-Authentication-Bypass-and-Information-Disclosure-on-Home-Routers",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.netgear.com/27253/NETGEAR-Product-Vulnerability-Advisory-Authentication-Bypass-and-Information-Disclosure-on-Home-Routers",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-10-09 13:15
Modified
2024-11-21 04:32
Severity ?
Summary
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:mbr1515_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB638052-409C-4DDF-8DF9-68938F1968F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:mbr1515:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03129881-D4E6-4509-8749-30AA2A0FF964",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:mbr1516_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A47C9274-DBBB-438D-B2CB-A64656C14B44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:mbr1516:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A28B362-80CD-47DF-BE61-77FE318756AC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7FE771C-4199-4225-B1CE-7BC10CD49F49",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C89394-ED7D-4C5F-9573-47A0378E22C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A13538C2-75B3-44B3-AFB1-FE8A78464341",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F47DC113-247A-4EF1-BA26-0DE0F130E15D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgnd3700_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB7B918-BE0F-4D06-8DEC-808440959DD7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC17F51-BDB8-4B30-B5E9-557CBDFDE785",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr2000v2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "684E46F4-5C25-4A73-A045-461BEF5875A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31247E55-E754-46D0-9A46-B0D319C21221",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3300_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1DD8079-4C49-4C70-84DA-F1BB77E31C00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5EFA6F2-B466-41DD-AAD6-10CE70DC6CC4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wndr3400_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAE2C525-B967-4266-8A04-C248075C74E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wndr3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "223685E0-7DF2-45A6-A9A7-11FA5BFEA3DB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr3500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90AA886C-2ECA-43C5-93D5-C092747047E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C33815C7-7CD6-4E07-9180-1EBA55F0D4B7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:wnr834bv2_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "444537A0-6EBE-40E4-9223-6075FDD7289B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:wnr834bv2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B83E1B8-F543-4678-8168-3D9E465BEB7D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.",
      },
      {
         lang: "es",
         value: "Determinados dispositivos NETGEAR permiten el acceso no autenticado a páginas críticas .cgi y .htm por medio de una subcadena que termina con .jpg, tal y como al agregar ?x=1.jpg en una URL. Esto afecta a MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500 y WNR834Bv2.",
      },
   ],
   id: "CVE-2019-17373",
   lastModified: "2024-11-21T04:32:12.537",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-10-09T13:15:20.193",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-07-24 15:29
Modified
2024-11-21 02:54
Severity ?
Summary
A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.
Impacted products
Vendor Product Version
netgear dgn2200_firmware 1.0.0.50_7.0.50
netgear dgn2200 -
netgear dgnd3700_firmware 1.0.0.17_1.0.17
netgear dgnd3700 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "80499893-9115-49DD-95B9-86FB0DCBA8B7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C89394-ED7D-4C5F-9573-47A0378E22C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netgear:dgnd3700_firmware:1.0.0.17_1.0.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EDC70D5-1652-4EBD-9ADE-83B3B5AD6861",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC17F51-BDB8-4B30-B5E9-557CBDFDE785",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.",
      },
      {
         lang: "es",
         value: "Hay una vulnerabilidad en la página \"BSW_cxttongr.htm\" de Netgear DGN2200, en su versión DGN2200-V1.0.0.50_7.0.50 y DGND3700, en su versión DGND3700-V1.0.0.17_1.0.17, que puede permitir que un atacante remoto acceda a esta página sin ningún tipo de autenticación. Al procesarse, expone la contraseña de administrador en texto claro antes de que se redirija a absw_vfysucc.cgia. Un atacante puede emplear esta contraseña para obtener acceso de administrador a la interfaz web del router objetivo.",
      },
   ],
   id: "CVE-2016-5649",
   lastModified: "2024-11-21T02:54:45.767",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-07-24T15:29:00.280",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-319",
            },
         ],
         source: "cret@cert.org",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-201807-0040
Vulnerability from variot

A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface. Netgear DGN2200 and DGND3700 Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The NETGEAR DGN2200 is a wireless router product from NETGEAR.

Affected Models: Netgear DGN2200 running firmware version DGN2200-V1.0.0.50_7.0.50 Netgear DGND3700 running firmware version DGND3700-V1.0.0.17_1.0.17

Solution: Netgear has released firmware version 1.0.0.52 for DGN2200 & 1.0.0.28 for DGND3700 to address this issue

  1. SSID & wireless key Disclosure (CVE-2016-5638) There are few web pages associated with the genie app. Genie app adds some capabilities over the Web GUI and can be accessed even when you are away from home. Once accessed, the page will be redirected to the aCongratulations2.htma page, which reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID) and Network Key (Password) in clear text.

Affected Models: Netgear WNDR4500 running firmware version V1.0.1.40_1.0.68

Solution: WNDR4500v1 has reached the End of Life so Netgear wonat be releasing any updates for this.

History

23.06.2016 - Initial contact to Netgear 24.06.2016 - Reported all details to Netgear 01.07.2016 - Email sent to Netgear asking for status update, no response 14.07.2016 - Email sent to Netgear asking for status update, no response 26.07.2016 - Netgear confirms findings 31.08.2016 - Email sent to Netgear asking for status update 02.09.2016 - Received reply from Netgear that they will be releasing a fix for this 23.12.2016 - Netgear informs that vulnerability has been fixed in the new version

Thanks,

Mandar

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0040",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "dgn2200",
            scope: "eq",
            trust: 1.6,
            vendor: "netgear",
            version: "1.0.0.50_7.0.50",
         },
         {
            model: "dgnd3700",
            scope: "eq",
            trust: 1.6,
            vendor: "netgear",
            version: "1.0.0.17_1.0.17",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.8,
            vendor: "net gear",
            version: "v1.0.0.50_7.0.50",
         },
         {
            model: "dgnd3700",
            scope: "eq",
            trust: 0.8,
            vendor: "net gear",
            version: "v1.0.0.17_1.0.17",
         },
         {
            model: "dgn2200 1.0.0.50 7.0.50",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgnd3700 1.0.0.17 1.0.17",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgnd3700_firmware:1.0.0.17_1.0.17:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Social Engineering Neo",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2016-5649",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2016-5649",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2018-17646",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-94468",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2016-5649",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-5649",
                  trust: 1.8,
                  value: "CRITICAL",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-17646",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201807-1808",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-94468",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-5649",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface. Netgear DGN2200 and DGND3700 Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The NETGEAR DGN2200 is a wireless router product from NETGEAR. \n\nAffected Models:\nNetgear DGN2200 running firmware version DGN2200-V1.0.0.50_7.0.50\nNetgear DGND3700 running firmware version DGND3700-V1.0.0.17_1.0.17\n\nSolution:\nNetgear has released firmware version 1.0.0.52 for DGN2200 & 1.0.0.28 for\nDGND3700 to address this issue\n\n2. SSID & wireless key Disclosure (CVE-2016-5638)\nThere are few web pages associated with the genie app. Genie app adds some\ncapabilities over the Web GUI and can be accessed even when you are away\nfrom home. Once accessed, the page\nwill be redirected to the aCongratulations2.htma page, which reveals some\nsensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID)\nand Network Key (Password) in clear text. \n\nAffected Models:\nNetgear WNDR4500 running firmware version V1.0.1.40_1.0.68\n\nSolution:\nWNDR4500v1 has reached the End of Life so Netgear wonat be releasing any\nupdates for this. \n\n## History\n\n23.06.2016 - Initial contact to Netgear\n24.06.2016 - Reported all details to Netgear\n01.07.2016 - Email sent to Netgear asking for status update, no response\n14.07.2016 - Email sent to Netgear asking for status update, no response\n26.07.2016 - Netgear confirms findings\n31.08.2016 - Email sent to Netgear asking for status update\n02.09.2016 - Received reply from Netgear that they will be releasing a fix\nfor this\n23.12.2016 - Netgear informs that vulnerability has been fixed in the new\nversion\n\n\nThanks,\n\nMandar\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            db: "PACKETSTORM",
            id: "140342",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-5649",
            trust: 3.3,
         },
         {
            db: "PACKETSTORM",
            id: "140342",
            trust: 3.3,
         },
         {
            db: "PACKETSTORM",
            id: "152675",
            trust: 1.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2016-5649",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "PACKETSTORM",
            id: "140342",
         },
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   id: "VAR-201807-0040",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
      ],
      trust: 1.437701455,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
      ],
   },
   last_update_date: "2023-12-18T12:01:47.005000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Top Page",
            trust: 0.8,
            url: "https://www.netgear.com/",
         },
         {
            title: "Patch for Netgear DGN2200 Information Disclosure Vulnerability",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/138891",
         },
         {
            title: "Netgear DGN2200 Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82592",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.2,
            url: "https://packetstormsecurity.com/files/140342/netgear-dgn2200-dgnd3700-wndr4500-information-disclosure.html",
         },
         {
            trust: 2.5,
            url: "http://packetstormsecurity.com/files/152675/netgear-dgn2200-dgnd3700-admin-password-disclosure.html",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-5649",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5649",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-5638",
         },
         {
            trust: 0.1,
            url: "https://www.netgear.com/",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "PACKETSTORM",
            id: "140342",
         },
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            db: "PACKETSTORM",
            id: "140342",
         },
         {
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-06T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            date: "2018-07-24T00:00:00",
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            date: "2018-07-24T00:00:00",
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            date: "2018-10-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            date: "2017-01-03T10:11:11",
            db: "PACKETSTORM",
            id: "140342",
         },
         {
            date: "2018-07-24T15:29:00.280000",
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            date: "2018-07-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-06T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-17646",
         },
         {
            date: "2019-10-09T00:00:00",
            db: "VULHUB",
            id: "VHN-94468",
         },
         {
            date: "2019-10-09T00:00:00",
            db: "VULMON",
            id: "CVE-2016-5649",
         },
         {
            date: "2018-10-29T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
         {
            date: "2019-10-09T23:18:54.143000",
            db: "NVD",
            id: "CVE-2016-5649",
         },
         {
            date: "2019-05-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Netgear DGN2200 and  DGND3700 Vulnerable to information disclosure",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-009214",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201807-1808",
         },
      ],
      trust: 0.6,
   },
}

var-202004-1262
Vulnerability from variot

Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06. plural NETGEAR The device contains a vulnerability related to information leakage.Information may be obtained. This affects AC1450 prior to 2017-01-06, C6300 prior to 2017-01-06, D500 prior to 2017-01-06, D1500 prior to 2017-01-06, D3600 prior to 2017-01-06, D6000 prior to 2017-01-06, D6100 prior to 2017-01-06, D6200 prior to 2017-01-06, D6200B prior to 2017-01-06, D6300B prior to 2017-01-06, D6300 prior to 2017-01-06, DGN1000v3 prior to 2017-01-06, DGN2200v1 prior to 2017-01-06, DGN2200v3 prior to 2017-01-06, DGN2200V4 prior to 2017-01-06, DGN2200Bv3 prior to 2017-01-06, DGN2200Bv4 prior to 2017-01-06, DGND3700v1 prior to 2017-01-06, DGND3700v2 prior to 2017-01-06, DGND3700Bv2 prior to 2017-01-06, JNR1010v1 prior to 2017-01-06, JNR1010v2 prior to 2017-01-06, JNR3300 prior to 2017-01-06, JR6100 prior to 2017-01-06, JR6150 prior to 2017-01-06, JWNR2000v5 prior to 2017-01-06, R2000 prior to 2017-01-06, R6050 prior to 2017-01-06, R6100 prior to 2017-01-06, R6200 prior to 2017-01-06, R6200v2 prior to 2017-01-06, R6220 prior to 2017-01-06, R6250 prior to 2017-01-06, R6300 prior to 2017-01-06, R6300v2 prior to 2017-01-06, R6700 prior to 2017-01-06, R7000 prior to 2017-01-06, R7900 prior to 2017-01-06, R7500 prior to 2017-01-06, R8000 prior to 2017-01-06, WGR614v10 prior to 2017-01-06, WNR1000v2 prior to 2017-01-06, WNR1000v3 prior to 2017-01-06, WNR1000v4 prior to 2017-01-06, WNR2000v3 prior to 2017-01-06, WNR2000v4 prior to 2017-01-06, WNR2000v5 prior to 2017-01-06, WNR2200 prior to 2017-01-06, WNR2500 prior to 2017-01-06, WNR3500Lv2 prior to 2017-01-06, WNDR3400v2 prior to 2017-01-06, WNDR3400v3 prior to 2017-01-06, WNDR3700v3 prior to 2017-01-06, WNDR3700v4 prior to 2017-01-06, WNDR3700v5 prior to 2017-01-06, WNDR4300 prior to 2017-01-06, WNDR4300v2 prior to 2017-01-06, WNDR4500v1 prior to 2017-01-06, WNDR4500v2 prior to 2017-01-06, and WNDR4500v3 prior to 2017-01-06

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1262",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "r6050",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "dgn2200b",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "dgn2200",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r7500",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wndr3400",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d6000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r6700",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wndr3700",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d6200b",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "jnr3300",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r6200",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d6100",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "dgnd3700b",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "ac1450",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "jr6100",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r6220",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wndr4500",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "jwnr2000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wnr2000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "c6300",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r8000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "jnr1010",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wndr4300",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wnr2500",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r6100",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r7900",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d6200",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "jr6150",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r7000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r6300",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d6300",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "dgnd3700",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wnr1000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r2000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d1500",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "r6250",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d500",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wnr2200",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d3600",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "dgn1000",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "d6300b",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wgr614",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "wnr3500l",
            scope: "lt",
            trust: 1,
            vendor: "netgear",
            version: "2017-01-06",
         },
         {
            model: "ac1450",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "c6300",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d1500",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d500",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d6200b",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d6300",
            scope: "eq",
            trust: 0.8,
            vendor: "netgear",
            version: "2017/01/06",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.2,
            vendor: "netgear",
            version: "1.0.0.49",
         },
         {
            model: "ac1450",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "ac1450",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.36",
         },
         {
            model: "d1500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.20",
         },
         {
            model: "d1500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.25",
         },
         {
            model: "d1500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.27",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.61",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.67",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.68",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.72",
         },
         {
            model: "d3600",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.76",
         },
         {
            model: "d500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.25",
         },
         {
            model: "d500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.27",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.49",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.61",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.67",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.68",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.72",
         },
         {
            model: "d6000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.76",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.50 0.0.50",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.55",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.56",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.57",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.58",
         },
         {
            model: "d6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.63",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.00.24",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.00.28",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.00.30",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.00.32",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.00.34",
         },
         {
            model: "d6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.00.36",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.55",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.58",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.82",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.86",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.94",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.96",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.102",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.106",
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.110",
         },
         {
            model: "dgn2200b",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgn2200b",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.58",
         },
         {
            model: "dgn2200b",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.82",
         },
         {
            model: "dgn2200b",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.94",
         },
         {
            model: "dgn2200b",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.96",
         },
         {
            model: "dgn2200b",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.102",
         },
         {
            model: "dgnd3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.32",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.40",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.42",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.44",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.46",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.48",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.50",
         },
         {
            model: "jnr1010",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.54",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.17",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.7",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.10",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.12",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.14",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.16",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.18",
         },
         {
            model: "jr6150",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.24",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.86",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.7",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.10",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.10j",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.12",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.14",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.16",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.18",
         },
         {
            model: "r6050",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.24",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.1",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.12",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.14",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.16",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.20",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.22",
         },
         {
            model: "r6100",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.28",
         },
         {
            model: "r6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r6200",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.14",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.46",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.50",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.60",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.64",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.66",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.68",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.80",
         },
         {
            model: "r6220",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.86",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.6 10.1.12",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.8",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.12",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.14",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.16",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.20",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.26",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.30",
         },
         {
            model: "r6250",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.34",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.36",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.06",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.6",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.8",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.8 10.0.77",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.12",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.18",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.22",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.24",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.28",
         },
         {
            model: "r6300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.32",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.14",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.16",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.20",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.22",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.26",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.30",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.36",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.44",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.46",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.48",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.6",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.8",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.32",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.52",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.66",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.84",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.38",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.42",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.1.20",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.2",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.4",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.12",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.14",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.16",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.24",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.36",
         },
         {
            model: "r6700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.62",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.7.2 1.1.93",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.7.10",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.4",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.6",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.10",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.12",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.14",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.18",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.26",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.28",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.32",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.34",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.42",
         },
         {
            model: "r7000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.9.60",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.108",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.110",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.112",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.116",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.118",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.122",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.124",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.130",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.10",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.16",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.20",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.24",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.26",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.34",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.36",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.38",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.40",
         },
         {
            model: "r7500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.46",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.8",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.12",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.14",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.16",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.18",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.26",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.4",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.10",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.16",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.8",
         },
         {
            model: "r7900",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.10",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.22",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.24",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.26",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.32",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.36",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.44",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.46",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.48",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.3.54",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.2",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.4",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.4 1.1.42",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.12",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.18",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.28",
         },
         {
            model: "r8000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.4.46",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.8",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.12",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.14",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.16",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.18",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.1.24",
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.122",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.86",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.88",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.92",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.94",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.96",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.46",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.48",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.50",
         },
         {
            model: "wndr3700",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.54",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.48",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.50",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.52",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.54",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.56",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.88",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.90",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.92",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.94",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.96",
         },
         {
            model: "wndr4300",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.2.98",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.48",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.50",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.52",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.54",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.56",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.62",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.68",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.72",
         },
         {
            model: "wndr4500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.48",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.40",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.42",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.44",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.46",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.48",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.50",
         },
         {
            model: "wnr1000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.1.0.54",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.42",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.48",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.58",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.62",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.64",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.68",
         },
         {
            model: "wnr2000",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.8",
         },
         {
            model: "wnr2500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wnr2500",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.0.0.58",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.40",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.44",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.46",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.48",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.50",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.54",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.0.56",
         },
         {
            model: "wnr3500l",
            scope: "eq",
            trust: 0.1,
            vendor: "netgear",
            version: "1.2.2.44 35.0.53na",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:ac1450_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:ac1450:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:c6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:c6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d1500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d1500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d6200b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d6200b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:d6300b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:d6300b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn1000:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200:v1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200:v4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200b:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200b:v4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgnd3700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgnd3700:v1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgnd3700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgnd3700:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgnd3700b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgnd3700b:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:jnr1010:v1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:jnr3300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:jnr3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:jr6100_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:jr6100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:jwnr2000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:jwnr2000:v5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r2000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r2000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6200:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wgr614_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wgr614:v10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3400:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3700:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr4500:v1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr4500:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr1000:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr1000:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr2000:v3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr2000:v4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr2200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr2200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr2500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr2500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2017-01-06",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
      ],
   },
   cve: "CVE-2016-11059",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "JVNDB-2017-014989",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CVE-2016-11059",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 0.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "JVNDB-2017-014989",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2016-11059",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "JVNDB-2017-014989",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202004-2304",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-11059",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06. plural NETGEAR The device contains a vulnerability related to information leakage.Information may be obtained. This affects AC1450 prior to 2017-01-06, C6300 prior to 2017-01-06, D500 prior to 2017-01-06, D1500 prior to 2017-01-06, D3600 prior to 2017-01-06, D6000 prior to 2017-01-06, D6100 prior to 2017-01-06, D6200 prior to 2017-01-06, D6200B prior to 2017-01-06, D6300B prior to 2017-01-06, D6300 prior to 2017-01-06, DGN1000v3 prior to 2017-01-06, DGN2200v1 prior to 2017-01-06, DGN2200v3 prior to 2017-01-06, DGN2200V4 prior to 2017-01-06, DGN2200Bv3 prior to 2017-01-06, DGN2200Bv4 prior to 2017-01-06, DGND3700v1 prior to 2017-01-06, DGND3700v2 prior to 2017-01-06, DGND3700Bv2 prior to 2017-01-06, JNR1010v1 prior to 2017-01-06, JNR1010v2 prior to 2017-01-06, JNR3300 prior to 2017-01-06, JR6100 prior to 2017-01-06, JR6150 prior to 2017-01-06, JWNR2000v5 prior to 2017-01-06, R2000 prior to 2017-01-06, R6050 prior to 2017-01-06, R6100 prior to 2017-01-06, R6200 prior to 2017-01-06, R6200v2 prior to 2017-01-06, R6220 prior to 2017-01-06, R6250 prior to 2017-01-06, R6300 prior to 2017-01-06, R6300v2 prior to 2017-01-06, R6700 prior to 2017-01-06, R7000 prior to 2017-01-06, R7900 prior to 2017-01-06, R7500 prior to 2017-01-06, R8000 prior to 2017-01-06, WGR614v10 prior to 2017-01-06, WNR1000v2 prior to 2017-01-06, WNR1000v3 prior to 2017-01-06, WNR1000v4 prior to 2017-01-06, WNR2000v3 prior to 2017-01-06, WNR2000v4 prior to 2017-01-06, WNR2000v5 prior to 2017-01-06, WNR2200 prior to 2017-01-06, WNR2500 prior to 2017-01-06, WNR3500Lv2 prior to 2017-01-06, WNDR3400v2 prior to 2017-01-06, WNDR3400v3 prior to 2017-01-06, WNDR3700v3 prior to 2017-01-06, WNDR3700v4 prior to 2017-01-06, WNDR3700v5 prior to 2017-01-06, WNDR4300 prior to 2017-01-06, WNDR4300v2 prior to 2017-01-06, WNDR4500v1 prior to 2017-01-06, WNDR4500v2 prior to 2017-01-06, and WNDR4500v3 prior to 2017-01-06",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "VULMON",
            id: "CVE-2016-11059",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-11059",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2016-11059",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   id: "VAR-202004-1262",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.4701049285185185,
   },
   last_update_date: "2023-12-18T13:47:33.127000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "NETGEAR Product Vulnerability Advisory: Authentication Bypass and Information Disclosure on Home Routers",
            trust: 0.8,
            url: "https://kb.netgear.com/27253/netgear-product-vulnerability-advisory-authentication-bypass-and-information-disclosure-on-home-routers",
         },
         {
            title: "Multiple NETGEAR Product information disclosure vulnerability repair measures",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=117917",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://kb.netgear.com/27253/netgear-product-vulnerability-advisory-authentication-bypass-and-information-disclosure-on-home-routers",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-11059",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-11059",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/200.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-04-28T00:00:00",
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            date: "2020-06-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            date: "2020-04-28T17:15:12.460000",
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            date: "2020-04-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-05-06T00:00:00",
            db: "VULMON",
            id: "CVE-2016-11059",
         },
         {
            date: "2020-06-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
         {
            date: "2020-05-06T19:14:54.050000",
            db: "NVD",
            id: "CVE-2016-11059",
         },
         {
            date: "2020-05-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  NETGEAR Information leakage vulnerabilities in devices",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-014989",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202004-2304",
         },
      ],
      trust: 0.6,
   },
}

var-201910-1261
Vulnerability from variot

Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2. plural NETGEAR The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NETGEAR MBR1515 is a wireless router of NETGEAR.

A number of NETGEAR products have authorization issues. The vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. There is currently no detailed vulnerability details provided

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201910-1261",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "wnr2000v2",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr3400",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wnr834bv2",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgn2200m",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "mbr1516",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wnr3500",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr3300",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "mbr1515",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgn2200",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgnd3700",
            scope: "eq",
            trust: 1,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgn2200",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "dgn2200m",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "dgnd3700",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "mbr1515",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "mbr1516",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "wndr3300",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "wndr3400",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "wnr2000v2",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "wnr3500",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "wnr834bv2",
            scope: null,
            trust: 0.8,
            vendor: "net gear",
            version: null,
         },
         {
            model: "dgnd3700",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgn2200",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wnr3500l",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr3300",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "wndr3400",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "mbr1516",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "mbr1515",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:mbr1515_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:mbr1515:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:mbr1516_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:mbr1516:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgn2200m_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgn2200m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:dgnd3700_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr2000v2_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3300_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wndr3400_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wndr3400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr3500_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr3500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netgear:wnr834bv2_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netgear:wnr834bv2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
      ],
   },
   cve: "CVE-2019-17373",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 7.5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2019-17373",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2020-23146",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2019-17373",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-17373",
                  trust: 1.8,
                  value: "CRITICAL",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2020-23146",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201910-514",
                  trust: 0.6,
                  value: "CRITICAL",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2. plural NETGEAR The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NETGEAR MBR1515 is a wireless router of NETGEAR. \n\r\n\r\nA number of NETGEAR products have authorization issues. The vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. There is currently no detailed vulnerability details provided",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-17373",
            trust: 3,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
   },
   id: "VAR-201910-1261",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
      ],
      trust: 1.26238279,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
      ],
   },
   last_update_date: "2023-12-18T12:27:56.299000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Top Page",
            trust: 0.8,
            url: "https://www.netgear.com/",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "CWE-287",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://github.com/zer0yu/cve_request/blob/master/netgear/netgear_web_interface_exists_authentication_bypass.md",
         },
         {
            trust: 2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-17373",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17373",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-04-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            date: "2019-10-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            date: "2019-10-09T13:15:20.193000",
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            date: "2019-10-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-04-16T00:00:00",
            db: "CNVD",
            id: "CNVD-2020-23146",
         },
         {
            date: "2019-10-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
         {
            date: "2020-08-24T17:37:01.140000",
            db: "NVD",
            id: "CVE-2019-17373",
         },
         {
            date: "2020-08-25T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  NETGEAR Authentication vulnerabilities in devices",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-011048",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201910-514",
         },
      ],
      trust: 0.6,
   },
}

var-201404-0115
Vulnerability from variot

Buffer overflow in Power Software WinArchiver 3.2 allows remote attackers to execute arbitrary code via a crafted .zip file. The etgear DGND3700 is a wireless router device. The Netgear DGND3700 ping.cgi script incorrectly filters user-submitted input, allowing authenticated remote attackers to exploit a vulnerability to submit a special POST request to execute arbitrary commands. WinArchiver is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. WinArchiver 3.2 is vulnerable; other versions may also be affected. ##############################################################################

                 - RealPentesting Advisory -

Title: SEH BUFFER OVERFLOW IN WINARCHIVER V.3.2 Severity: Critical History: 24.Apr.2013 Vulnerability reported Authors: Josep Pi Rodriguez, Pedro Guillen Nuñez , Miguel Angel de Castro Simon Organization: RealPentesting URL: http://www.realpentesting.blogspot.com Product: WinArchiver Version: 3.2 Vendor: PowerSoftware Url Vendor: http://winarchiver.com Platform: Windows Type of vulnerability: SEH buffer overflow Issue fixed in version: (Not fixed) CVE identifier: CVE-2013-5660

[ DESCRIPTION SOFTWARE ]

From vendor website: WinArchiver is a powerful archive utility, which can open, create, and manage archive files. It supports almost all archive formats, including zip, rar, 7z, iso, and other popular formats. WinArchiver can also mount the archive to a virtual drive without extraction.

[ VULNERABILITY DETAILS ]

WinArchiver suffers from a SEH based overflow Above you can see the debugged process after the seh overflow. As you can see in the bold letters the structure exception handler (seh) has overwritten by 00410041 which is manipulated by us. The proof of concept .zip file is attached in this mail. You have to open the .zip with WinArchiver and click the extract button in order to trigger the vulnerability.

Registers

eax=00000041 ebx=000017a6 ecx=043b0000 edx=7fffdf41 esi=043aed84 edi=043aed58 eip=004e64cb esp=043ae8cc ebp=043ae8d0 iopl=0 nv up ei pl nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010213 *** ERROR: Module load completed but symbols could not be loaded for C:\Archivos de Programa\WinArchiver\WinArchiver.exe WinArchiver+0xe64cb: 004e64cb 668901 mov word ptr [ecx],ax ds:0023:043b0000=???? Seh chain

!exchain 043aff0c: WinArchiver+10041 (00410041) Invalid exception stack at 00410041

By opening a specially crafted zip file, it is possible to execute arbitrary code.We can sucesfully exploit the vulnerability in order to gain code execution.

[ VENDOR COMMUNICATION ]

20/04/2013 : vendor contacted.No response 24/04/2013 : vendor contacted again.No response 29/04/2013: PUBLIC DISCLOSURE

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0115",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "winarchiver",
            scope: "eq",
            trust: 1.6,
            vendor: "powersoftware",
            version: "3.2",
         },
         {
            model: "winarchiver",
            scope: "eq",
            trust: 0.8,
            vendor: "power",
            version: "3.2",
         },
         {
            model: "dgnd3700",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:powersoftware:winarchiver:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Josep Pi Rodriguez, Pedro Guillen Nunez, and Miguel Angel de Castro Simon",
      sources: [
         {
            db: "BID",
            id: "59626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2013-5660",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 9.3,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2013-5660",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "ADJACENT_NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.7,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 5.1,
                  id: "CNVD-2013-04220",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:A/AC:L/Au:S/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2013-5660",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2013-04220",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201305-128",
                  trust: 0.6,
                  value: "CRITICAL",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Buffer overflow in Power Software WinArchiver 3.2 allows remote attackers to execute arbitrary code via a crafted .zip file. The etgear DGND3700 is a wireless router device. The Netgear DGND3700 ping.cgi script incorrectly filters user-submitted input, allowing authenticated remote attackers to exploit a vulnerability to submit a special POST request to execute arbitrary commands. WinArchiver is prone to a buffer-overflow  vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nWinArchiver 3.2 is vulnerable; other versions may also be affected. ##############################################################################\n\n\n                     - RealPentesting Advisory -\n\n###############################################################################\n\n  Title: SEH BUFFER OVERFLOW IN WINARCHIVER V.3.2\n  Severity: Critical\n  History: 24.Apr.2013 Vulnerability reported\n  Authors: Josep Pi Rodriguez, Pedro Guillen Nuñez , Miguel Angel de Castro Simon\n  Organization: RealPentesting\n  URL: http://www.realpentesting.blogspot.com\n  Product: WinArchiver\n  Version: 3.2\n  Vendor: PowerSoftware\n  Url Vendor: http://winarchiver.com\n  Platform: Windows\n  Type of vulnerability: SEH buffer overflow\n  Issue fixed in version: (Not fixed)\n  CVE identifier: CVE-2013-5660\n\n[ DESCRIPTION SOFTWARE ]\n\nFrom vendor website:\nWinArchiver is a powerful archive utility, which can open, create, and manage archive files. It supports almost all archive formats, including zip, rar, 7z, iso, and other popular formats. WinArchiver can also mount the archive to a virtual drive without extraction. \n\n[ VULNERABILITY DETAILS ]\n\nWinArchiver suffers from a SEH based overflow\nAbove you can see the debugged process after the seh overflow. As you can see in the bold letters the structure exception handler (seh) has overwritten by 00410041 which is manipulated by us. The proof of concept .zip file is attached in this mail. You have to open the .zip with WinArchiver and click the extract button in order to trigger the vulnerability. \n\nRegisters\n---------\neax=00000041 ebx=000017a6 ecx=043b0000 edx=7fffdf41 esi=043aed84 edi=043aed58\neip=004e64cb esp=043ae8cc ebp=043ae8d0 iopl=0         nv up ei pl nz ac po cy\ncs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010213\n*** ERROR: Module load completed but symbols could not be loaded for C:\\Archivos de Programa\\WinArchiver\\WinArchiver.exe\nWinArchiver+0xe64cb:\n004e64cb 668901          mov     word ptr [ecx],ax        ds:0023:043b0000=????\nSeh chain\n----------\n!exchain\n043aff0c: WinArchiver+10041 (00410041)\nInvalid exception stack at 00410041\n\nBy opening a specially crafted zip file, it is possible to execute arbitrary code.We can sucesfully exploit the vulnerability in order to gain code execution. \n\n[ VENDOR COMMUNICATION ]\n\n20/04/2013 : vendor contacted.No response\n24/04/2013 : vendor contacted again.No response\n29/04/2013:  PUBLIC DISCLOSURE\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            db: "BID",
            id: "59626",
         },
         {
            db: "PACKETSTORM",
            id: "123051",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2013-5660",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "59626",
            trust: 1.9,
         },
         {
            db: "OSVDB",
            id: "92992",
            trust: 1.6,
         },
         {
            db: "PACKETSTORM",
            id: "121512",
            trust: 1.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
            trust: 0.8,
         },
         {
            db: "VULDB",
            id: "8505",
            trust: 0.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
            trust: 0.6,
         },
         {
            db: "FULLDISC",
            id: "20130902 LIST OF VULNERABILITIES DISCOVERED BY REALPENTESTING",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "123051",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            db: "BID",
            id: "59626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "PACKETSTORM",
            id: "123051",
         },
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   id: "VAR-201404-0115",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
      ],
      trust: 1.16666666,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
      ],
   },
   last_update_date: "2023-12-18T13:49:00.210000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "WinArchiver",
            trust: 0.8,
            url: "http://www.winarchiver.com/index.htm",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "http://realpentesting.blogspot.com.es/p/blog-page_3.html",
         },
         {
            trust: 1.6,
            url: "http://osvdb.org/ref/92/winarchiver-overflow.txt",
         },
         {
            trust: 1.6,
            url: "http://osvdb.org/show/osvdb/92992",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/121512/winarchiver-3.2-buffer-overflow.html",
         },
         {
            trust: 1.6,
            url: "http://seclists.org/fulldisclosure/2013/sep/8",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/bid/59626",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5660",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5660",
         },
         {
            trust: 0.6,
            url: "http://www.scip.ch/en/?vuldb.8505",
         },
         {
            trust: 0.6,
            url: "http://osvdb.org/ref/92/netgear-dgnd3700.txt",
         },
         {
            trust: 0.1,
            url: "http://www.realpentesting.blogspot.com",
         },
         {
            trust: 0.1,
            url: "http://winarchiver.com",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2013-5660",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "PACKETSTORM",
            id: "123051",
         },
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            db: "BID",
            id: "59626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            db: "PACKETSTORM",
            id: "123051",
         },
         {
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-04-26T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            date: "2013-04-24T00:00:00",
            db: "BID",
            id: "59626",
         },
         {
            date: "2014-04-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            date: "2013-09-02T19:03:52",
            db: "PACKETSTORM",
            id: "123051",
         },
         {
            date: "2014-04-25T17:12:03.847000",
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            date: "2013-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-04-26T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-04220",
         },
         {
            date: "2015-03-19T09:12:00",
            db: "BID",
            id: "59626",
         },
         {
            date: "2014-04-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
         {
            date: "2014-04-25T18:44:00.477000",
            db: "NVD",
            id: "CVE-2013-5660",
         },
         {
            date: "2014-04-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Power Software of  WinArchiver Vulnerable to buffer overflow",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2013-006353",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201305-128",
         },
      ],
      trust: 0.6,
   },
}

var-201712-1126
Vulnerability from variot

DGND3700 / DGN2200 is a wireless router from Netgear.

An information disclosure vulnerability exists in DGND3700 / DGN2200. The vulnerability is caused by a privileged page. An attacker can use this vulnerability to obtain sensitive information in the respnose annotation.

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201712-1126",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "dgn2200",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
         {
            model: "dgnd3700",
            scope: null,
            trust: 0.6,
            vendor: "netgear",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "CNVD-2017-35653",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "CNVD",
                  id: "CNVD-2017-35653",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "DGND3700 / DGN2200 is a wireless router from Netgear.\n\nAn information disclosure vulnerability exists in DGND3700 / DGN2200. The vulnerability is caused by a privileged page. An attacker can use this vulnerability to obtain sensitive information in the respnose annotation.",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
      trust: 0.6,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   id: "VAR-201712-1126",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
      trust: 1.1037499949999998,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   last_update_date: "2022-05-04T09:33:59.935000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "US Netgear DGND3700 / DGN2200 has information disclosure vulnerability",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/105479",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-01-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "US Netgear DGND3700 / DGN2200 has information disclosure vulnerability",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-35653",
         },
      ],
      trust: 0.6,
   },
}

cve-2016-11059
Vulnerability from cvelistv5
Published
2020-04-28 16:20
Modified
2024-08-06 03:47
Severity ?
Summary
Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T03:47:34.858Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.netgear.com/27253/NETGEAR-Product-Vulnerability-Advisory-Authentication-Bypass-and-Information-Disclosure-on-Home-Routers",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-01-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-28T16:20:22",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.netgear.com/27253/NETGEAR-Product-Vulnerability-Advisory-Authentication-Bypass-and-Information-Disclosure-on-Home-Routers",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-11059",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Certain NETGEAR devices are affected by password exposure. This affects AC1450 before 2017-01-06, C6300 before 2017-01-06, D500 before 2017-01-06, D1500 before 2017-01-06, D3600 before 2017-01-06, D6000 before 2017-01-06, D6100 before 2017-01-06, D6200 before 2017-01-06, D6200B before 2017-01-06, D6300B before 2017-01-06, D6300 before 2017-01-06, DGN1000v3 before 2017-01-06, DGN2200v1 before 2017-01-06, DGN2200v3 before 2017-01-06, DGN2200V4 before 2017-01-06, DGN2200Bv3 before 2017-01-06, DGN2200Bv4 before 2017-01-06, DGND3700v1 before 2017-01-06, DGND3700v2 before 2017-01-06, DGND3700Bv2 before 2017-01-06, JNR1010v1 before 2017-01-06, JNR1010v2 before 2017-01-06, JNR3300 before 2017-01-06, JR6100 before 2017-01-06, JR6150 before 2017-01-06, JWNR2000v5 before 2017-01-06, R2000 before 2017-01-06, R6050 before 2017-01-06, R6100 before 2017-01-06, R6200 before 2017-01-06, R6200v2 before 2017-01-06, R6220 before 2017-01-06, R6250 before 2017-01-06, R6300 before 2017-01-06, R6300v2 before 2017-01-06, R6700 before 2017-01-06, R7000 before 2017-01-06, R7900 before 2017-01-06, R7500 before 2017-01-06, R8000 before 2017-01-06, WGR614v10 before 2017-01-06, WNR1000v2 before 2017-01-06, WNR1000v3 before 2017-01-06, WNR1000v4 before 2017-01-06, WNR2000v3 before 2017-01-06, WNR2000v4 before 2017-01-06, WNR2000v5 before 2017-01-06, WNR2200 before 2017-01-06, WNR2500 before 2017-01-06, WNR3500Lv2 before 2017-01-06, WNDR3400v2 before 2017-01-06, WNDR3400v3 before 2017-01-06, WNDR3700v3 before 2017-01-06, WNDR3700v4 before 2017-01-06, WNDR3700v5 before 2017-01-06, WNDR4300 before 2017-01-06, WNDR4300v2 before 2017-01-06, WNDR4500v1 before 2017-01-06, WNDR4500v2 before 2017-01-06, and WNDR4500v3 before 2017-01-06.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.netgear.com/27253/NETGEAR-Product-Vulnerability-Advisory-Authentication-Bypass-and-Information-Disclosure-on-Home-Routers",
                     refsource: "CONFIRM",
                     url: "https://kb.netgear.com/27253/NETGEAR-Product-Vulnerability-Advisory-Authentication-Bypass-and-Information-Disclosure-on-Home-Routers",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-11059",
      datePublished: "2020-04-28T16:20:22",
      dateReserved: "2020-04-27T00:00:00",
      dateUpdated: "2024-08-06T03:47:34.858Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-17373
Vulnerability from cvelistv5
Published
2019-10-09 12:07
Modified
2024-08-05 01:40
Severity ?
Summary
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T01:40:15.309Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-09T12:07:13",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2019-17373",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md",
                     refsource: "MISC",
                     url: "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2019-17373",
      datePublished: "2019-10-09T12:07:13",
      dateReserved: "2019-10-09T00:00:00",
      dateUpdated: "2024-08-05T01:40:15.309Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-5649
Vulnerability from cvelistv5
Published
2018-07-24 15:00
Modified
2024-08-06 01:08
Severity ?
Summary
A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.
Impacted products
Vendor Product Version
Netgear DGN2200 Version: DGN2200-V1.0.0.50_7.0.50
Netgear DGND3700 Version: DGND3700-V1.0.0.17_1.0.17
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:08:00.436Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DGN2200",
               vendor: "Netgear",
               versions: [
                  {
                     status: "affected",
                     version: "DGN2200-V1.0.0.50_7.0.50",
                  },
               ],
            },
            {
               product: "DGND3700",
               vendor: "Netgear",
               versions: [
                  {
                     status: "affected",
                     version: "DGND3700-V1.0.0.17_1.0.17",
                  },
               ],
            },
         ],
         datePublic: "2017-01-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-319",
                     description: "CWE-319",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-30T17:06:08",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Netgear has released firmware version 1.0.0.52 for DGN2200 & 1.0.0.28 for DGND3700 to address this issue.",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Netgear DGN2200 and DGND3700 disclose the administrator password",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2016-5649",
               STATE: "PUBLIC",
               TITLE: "Netgear DGN2200 and DGND3700 disclose the administrator password",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DGN2200",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "DGN2200-V1.0.0.50_7.0.50",
                                          version_value: "DGN2200-V1.0.0.50_7.0.50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "DGND3700",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "DGND3700-V1.0.0.17_1.0.17",
                                          version_value: "DGND3700-V1.0.0.17_1.0.17",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Netgear",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-319",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html",
                     refsource: "MISC",
                     url: "https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "Netgear has released firmware version 1.0.0.52 for DGN2200 & 1.0.0.28 for DGND3700 to address this issue.",
               },
            ],
            source: {
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2016-5649",
      datePublished: "2018-07-24T15:00:00",
      dateReserved: "2016-06-16T00:00:00",
      dateUpdated: "2024-08-06T01:08:00.436Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}