var-202006-1925
Vulnerability from variot
NETGEAR is a computer network equipment developer founded in 1996 and headquartered in San Jose, California.
Many NETGEAR devices have unauthorized remote code execution vulnerabilities. Attackers can use the vulnerability to execute commands directly.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1925", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ac1450 v1.0.0.6 1.0.3-v1.0.0.36 10.0.17", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "d6220 v1.0.0.16 1.0.16-v1.0.0.52 1.0.52", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "d6300b v1.0.0.16 1.0.16-v1.0.0.102 1.0.102", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "d6400 v1.0.0.22 1.0.22-v1.0.0.88 1.0.88", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "d7000v2 v1.0.0.38 1.0.1-v1.0.0.56 1.0.1", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "dc112a v1.0.0.24 1.0.60-v1.0.0.44 1.0.60", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "dgn2200 v1.0.0.36 7.0.36-v1.0.0.58 7.0.57", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "dgn2200v4 v1.0.0.5 5.0.3-v1.0.0.110 1.0.110", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "dgn2200m v1.0.0.24 1.0.20na-v1.0.0.37 1.0.21ww", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "dgnd3700 v1.0.0.12 1.0.12na-v1.0.0.17 1.0.17", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex3700 v1.0.0.22 1.0.17-v1.0.0.78 1.0.51", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex3800 v1.0.0.26 1.0.19-v1.0.0.78 1.0.51", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex3920 v1.0.0.26 1.0.19-v1.0.0.78 1.0.51", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6000 v1.0.0.10 1.0.6-v1.0.0.38 1.0.22", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6100 v1.0.0.22 1.0.51-v1.0.2.24 1.1.134", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6120 v1.0.0.4 1.0.2-v1.0.0.48 1.0.30", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6130 v1.0.0.12 1.0.7-v1.0.0.30 1.0.17", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6150 v1.0.0.14 1.0.54-v1.0.0.42 1.0.73", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6200 v1.0.0.38 1.1.52-v1.0.3.90 1.1.125", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex6920 v1.0.0.4 1.0.2-v1.0.0.40 1.0.25", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "ex7000 v1.0.0.30 1.0.72-v1.0.1.84 1.0.148", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "lg2200d v1.0.0.57 1.0.40", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "mbm621", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "v1.1.3" }, { "model": "mbr624gu v6.00.22.12-v6.01.30.64ww", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "mbr1200", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "v1.2.2.53" }, { "model": "mbr1515", "scope": "eq", "trust": 0.6, "vendor": "netgear", "version": "v1.2.2.68" }, { "model": "mbr1516 v1.2.2.84bm", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "mbrn3000 v1.0.0.43na-v1.0.0.74 2.0.12ww", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "mvbr1210c v1.2.0.35bm", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r4500 v1.0.0.4 1.0.3", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6200 v1.0.0.18 1.0.18-v1.0.1.58 1.0.44", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6200v2 v1.0.1.14 1.0.14-v1.0.3.12 10.1.11", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6250 v1.0.0.62 1.0.62-v1.0.4.38 10.1.30", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6300 v1.0.0.68 1.0.16-v1.0.2.80 1.0.59", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6300v2 v1.0.1.72 1.0.21-v1.0.4.36 10.0.93", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6400 v1.0.0.14 1.0.8-v1.0.1.52 1.0.36", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6400v2 v1.0.2.14 1.0.7-v1.0.4.84 10.0.58", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6700 v1.0.0.2 1.0.1-v1.0.2.8 10.0.53", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6700v3 v1.0.2.52 1.0.39-v1.0.4.84 10.0.58", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6900 v1.0.0.2 1.0.2-v1.0.2.8 10.0.38", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r6900p v1.0.0.46 1.0.30-v1.3.1.64 10.1.36", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r7000 v1.0.0.96 1.0.15-v1.0.11.100 10.2.100", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r7000p v1.0.0.44 1.0.27-v1.3.1.64 10.1.36", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r7100lg v1.0.0.24 1.0.6-v1.0.0.52 1.0.6", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r7300 v1.0.0.26 1.0.6-v1.0.0.74 1.0.29", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r7850 v1.0.4.42 10.0.1-v1.0.5.48 10.0.4", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r7900 v1.0.0.2 10.0.1-v1.0.4.22 10.0.44", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r8300 v1.0.2.48 1.0.52-v1.0.2.130 1.0.99", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r8500 v1.0.0.28 1.0.15-v1.0.2.130 1.0.99", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wgr614v8 v1.1.20 7.0.37na-v1.2.10 21.0.52", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wgr614v9 v1.0.9 1.0.1na-v1.2.32 43.0.46", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wgr614v10 v1.0.2.18 47.0.52na-v1.0.2.66 60.0.90", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wgt624v4 v2.0.6 2.0.6na-v2.0.13 2.0.15na", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn2500rpv2 v1.0.0.24 1.0.53-v1.0.0.30 1.0.58", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn2500rpv2 v1.0.0.30 1.0.41-v1.0.1.54 1.0.68", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn3000rp v1.0.0.12 1.0.12-v1.0.2.64 1.1.86", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn3100rpv2 v1.0.0.6 1.0.12-v1.0.0.20 1.0.22", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wn3500rp v1.0.0.12 1.0.49-v1.0.0.22 1.0.62", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnce3001 v1.0.0.38-v1.0.0.50 1.0.35", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr3300v2 v1.0.0.26 11.0.26na", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr3400 v1.0.0.34 15.0.42-v1.0.0.52 20.0.60", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr3400v2 v1.0.0.54 1.0.82", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr3400v3 v1.0.0.20 1.0.28-v1.0.1.24 1.0.67", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr3700v3 v1.0.0.18 1.0.14-v1.0.0.42 1.0.33", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr4000 v1.0.0.66 8.0.55-v1.0.2.10 9.1.89", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr4500 v1.0.0.40 1.0.10-v1.0.1.46 1.0.76", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr4500v2 v1.0.0.26 1.0.16-v1.0.0.72 1.0.45", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr834bv2 v1.0.32 1.0.32na-v2.1.13 2.1.13", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr1000v3 v1.0.2.4 39.0.39-v1.0.2.72 60.0.96", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr2000v2 v1.0.0.34 29.0.45na-v1.2.0.8 36.0.60", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr3500 v1.0.10 1.0.10na-v1.0.36 8.0.36na", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr3500v2 v1.0.0.64 11.0.51na-v1.2.2.28 25.0.85", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr3500l v1.0.0.86 13.0.75na-v1.2.2.48 35.0.55na", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wnr3500lv2 v1.0.0.10-v1.2.0.56 50.0.96", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "xr300 v1.0.1.4 10.1.4-v1.0.3.38 10.3.30", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "r8000 v1.0.0.46 1.0.17-v1.0.4.46 10.1.63", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "rs400 v1.5.0.34 10.0.33", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null }, { "model": "wndr3300 v1.0.14na-v1.0.45 1.0.45", "scope": null, "trust": 0.6, "vendor": "netgear", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-34628", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2020-34628", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NETGEAR is a computer network equipment developer founded in 1996 and headquartered in San Jose, California.\n\r\n\r\nMany NETGEAR devices have unauthorized remote code execution vulnerabilities. Attackers can use the vulnerability to execute commands directly.", "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ], "trust": 0.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SEEBUG", "id": "SSVID-98253", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-34628", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "id": "VAR-202006-1925", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ], "trust": 1.5166666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "last_update_date": "2022-05-17T02:01:00.901000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.6, "url": "https://github.com/grimm-co/notquite0dayfriday/tree/master/2020.06.15-netgear" }, { "trust": 0.6, "url": "https://www.seebug.org/vuldb/ssvid-98253" }, { "trust": 0.6, "url": "https://www.zoomeye.org/searchresult?q=service%3a%22http%22service%3a%" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2020-34628" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unauthorized remote code execution vulnerability in multiple Netgear devices", "sources": [ { "db": "CNVD", "id": "CNVD-2020-34628" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.