NETGEAR R6700V3 Firmware 1.0.4.118

CPE Details

NETGEAR R6700V3 Firmware 1.0.4.118
1.0.4.118
2022-01-05
13h27 +00:00
2022-01-06
16h55 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:netgear:r6700v3_firmware:1.0.4.118:*:*:*:*:*:*:*

Informations

Vendor

netgear

Product

r6700v3_firmware

Version

1.0.4.118

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-48196 2022-12-30 00h00 +00:00 Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94.
9.8
Critical
CVE-2021-45608 2021-12-25 23h37 +00:00 Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by an integer overflow by an unauthenticated attacker. Remote code execution from the WAN interface (TCP port 20005) cannot be ruled out; however, exploitability was judged to be of "rather significant complexity" but not "impossible." The overflow is in SoftwareBus_dispatchNormalEPMsgOut in the KCodes NetUSB kernel module. Affected NETGEAR devices are D7800 before 1.0.1.68, R6400v2 before 1.0.4.122, and R6700v3 before 1.0.4.122.
9.8
Critical
CVE-2021-34991 2021-11-15 14h40 +00:00 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.
8.8
High