9.8

CVE-2021-45527

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.68, D6400 before 1.0.0.102, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.54, EX7000 before 1.0.1.94, EX7500 before 1.0.0.72, R6250 before 1.0.4.48, R6300v2 before 1.0.4.52, R6400 before 1.0.1.70, R6400v2 before 1.0.4.102, R6700v3 before 1.0.4.102, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7850 before 1.0.5.68, R7900 before 1.0.4.30, R7960P before 1.4.1.68, R8000 before 1.0.4.52, RAX200 before 1.0.2.88, RBS40V before 2.6.2.4, RS400 before 1.5.1.80, XR300 before 1.0.3.56, R7000P before 1.3.2.124, R8000P before 1.4.1.68, R8500 before 1.0.2.144, RAX80 before 1.0.3.102, R6900P before 1.3.2.124, R7900P before 1.4.1.68, R8300 before 1.0.2.144, RAX75 before 1.0.3.102, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NetgearRbk752 Firmware Version < 3.2.17.12
   NetgearRbk752 Version-
NetgearRbr750 Firmware Version < 3.2.17.12
   NetgearRbr750 Version-
NetgearRbs750 Firmware Version < 3.2.17.12
   NetgearRbs750 Version-
NetgearRbk852 Firmware Version < 3.2.17.12
   NetgearRbk852 Version-
NetgearRbr850 Firmware Version < 3.2.17.12
   NetgearRbr850 Version-
NetgearRbs850 Firmware Version < 3.2.17.12
   NetgearRbs850 Version-
NetgearD6220 Firmware Version < 1.0.0.68
   NetgearD6220 Version-
NetgearD6400 Firmware Version < 1.0.0.102
   NetgearD6400 Version-
NetgearD7000v2 Firmware Version < 1.0.0.66
   NetgearD7000v2 Version-
NetgearD8500 Firmware Version < 1.0.3.58
   NetgearD8500 Version-
NetgearDc112a Firmware Version < 1.0.0.54
   NetgearDc112a Version-
NetgearEx7000 Firmware Version < 1.0.1.94
   NetgearEx7000 Version-
NetgearEx7500 Firmware Version < 1.0.0.72
   NetgearEx7500 Version-
NetgearR6250 Firmware Version < 1.0.4.48
   NetgearR6250 Version-
NetgearR6300v2 Firmware Version < 1.0.4.52
   NetgearR6300v2 Version-
NetgearR6400 Firmware Version < 1.0.1.70
   NetgearR6400 Version-
NetgearR6400v2 Firmware Version < 1.0.4.102
   NetgearR6400v2 Version-
NetgearR6700v3 Firmware Version < 1.0.4.102
   NetgearR6700v3 Version-
NetgearR7000 Firmware Version < 1.0.11.116
   NetgearR7000 Version-
NetgearR7100lg Firmware Version < 1.0.0.64
   NetgearR7100lg Version-
NetgearR7850 Firmware Version < 1.0.5.68
   NetgearR7850 Version-
NetgearR7900 Firmware Version < 1.0.4.30
   NetgearR7900 Version-
NetgearR7960p Firmware Version < 1.4.1.68
   NetgearR7960p Version-
NetgearR8000 Firmware Version < 1.0.4.52
   NetgearR8000 Version-
NetgearRax200 Firmware Version < 1.0.2.88
   NetgearRax200 Version-
NetgearRax75 Firmware Version < 1.0.3.102
   NetgearRax75 Version-
NetgearRax80 Firmware Version < 1.0.3.102
   NetgearRax80 Version-
NetgearRbs40v Firmware Version < 2.6.2.4
   NetgearRbs40v Version-
NetgearXr300 Firmware Version < 1.0.3.56
   NetgearXr300 Version-
NetgearRs400 Firmware Version < 1.5.1.80
   NetgearRs400 Version-
NetgearR7000p Firmware Version < 1.3.2.124
   NetgearR7000p Version-
NetgearR8000p Firmware Version < 1.4.1.68
   NetgearR8000p Version-
NetgearR8500 Firmware Version < 1.0.2.144
   NetgearR8500 Version-
NetgearR6900p Firmware Version < 1.3.2.124
   NetgearR6900p Version-
NetgearR7900p Firmware Version < 1.4.1.68
   NetgearR7900p Version-
NetgearR8300 Firmware Version < 1.0.2.144
   NetgearR8300 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.24% 0.774
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
cve@mitre.org 9.6 2.8 6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.