9.8
CVE-2023-36187
- EPSS 4.54%
- Published 01.09.2023 16:15:08
- Last modified 21.11.2024 08:09:23
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd.
Data is provided by the National Vulnerability Database (NVD)
Netgear ≫ Cbr40 Firmware Version < 2.5.0.24
Netgear ≫ Lax20 Firmware Version < 1.1.6.34
Netgear ≫ Mk62 Firmware Version < 1.1.6.122
Netgear ≫ Mr60 Firmware Version < 1.1.6.122
Netgear ≫ Ms60 Firmware Version < 1.1.6.122
Netgear ≫ Rbw30 Firmware Version < 2.6.2.6
Netgear ≫ R6400 Firmware Version < 1.0.1.70
Netgear ≫ R6400v2 Firmware Version < 1.0.4.118
Netgear ≫ R6700v3 Firmware Version < 1.0.4.118
Netgear ≫ R7000 Firmware Version < 1.0.11.130
Netgear ≫ R7000p Firmware Version < 1.3.3.148
Netgear ≫ Rax200 Firmware Version < 1.0.4.120
Netgear ≫ Rax75 Firmware Version < 1.0.4.120
Netgear ≫ Rax80 Firmware Version < 1.0.4.120
Netgear ≫ Rs400 Firmware Version < 1.5.1.86
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 4.54% | 0.885 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.