Product:

R6700_firmware

(Netgear)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 173
Date Id Summary Products Score Patch Annotated
2021-12-30 CVE-2021-20175 Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext R6700_firmware 7.5
2021-12-30 CVE-2021-23147 Netgear Nighthawk R6700 version 1.0.4.120 does not have sufficient protections for the UART console. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection and execute commands as the root user without authentication. R6700_firmware 6.8
2021-12-30 CVE-2021-45732 Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed. R6700_firmware 8.8
2021-12-26 CVE-2021-45525 Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects EX7000 before 1.0.1.80, R6400 before 1.0.1.50, R6400v2 before 1.0.4.118, R6700 before 1.0.2.8, R6700v3 before 1.0.4.118, R6900 before 1.0.2.8, R6900P before 1.3.2.124, R7000 before 1.0.9.88, R7000P before 1.3.2.124, R7900 before 1.0.3.18, R7900P before 1.4.1.50, R8000 before 1.0.4.46, R8000P before 1.4.1.50, RAX80 before 1.0.1.56, and WNR3500Lv2 before 1.2.0.62. Ex7000_firmware, R6400_firmware, R6400v2_firmware, R6700_firmware, R6700v3_firmware, R6900_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7900_firmware, R7900p_firmware, R8000_firmware, R8000p_firmware, Rax80_firmware, Wnr3500lv2_firmware 8.8
2021-12-26 CVE-2021-45604 Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects CBR750 before 3.2.18.2, D6220 before 1.0.0.68, D6400 before 1.0.0.102, D8500 before 1.0.3.60, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6300v2 before 1.0.4.50, R6400 before 1.0.1.68, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68,... Cbr750_firmware, D6220_firmware, D6400_firmware, D8500_firmware, Lax20_firmware, Mk62_firmware, Mr60_firmware, Ms60_firmware, R6300_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7850_firmware, R7900_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, Rax15_firmware, Rax200_firmware, Rax20_firmware, Rax35_firmware, Rax40_firmware, Rax43_firmware, Rax45_firmware, Rax50_firmware, Rax75_firmware, Rax80_firmware, Rbk752_firmware, Rbk852_firmware, Rbr750_firmware, Rbr850_firmware, Rbs750_firmware, Rbs850_firmware, Rs400_firmware, Xr1000_firmware 4.5
2021-12-26 CVE-2021-45549 Certain NETGEAR devices are affected by command injection by an authenticated user. This affects LAX20 before 1.1.6.28, MK62 before 1.1.6.122, MR60 before 1.1.6.122, MS60 before 1.1.6.122, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before... Lax20_firmware, Mk62_firmware, Mr60_firmware, Ms60_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7850_firmware, R7900_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, Rax15_firmware, Rax200_firmware, Rax20_firmware, Rax35_firmware, Rax40_firmware, Rax43_firmware, Rax45_firmware, Rax50_firmware, Rax75_firmware, Rax80_firmware, Rs400_firmware, Xr1000_firmware 6.8
2021-12-26 CVE-2021-45550 Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.78, D6100 before 1.0.0.63, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DGN2200Bv4 before 1.0.0.109, DGN2200v4 before 1.0.0.110, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.4, R6900P before... D3600_firmware, D6000_firmware, D6100_firmware, D6220_firmware, D6400_firmware, D7800_firmware, D8500_firmware, Dgn2200_firmware, Dgn2200b_firmware, R6250_firmware, R6300_firmware, R6400_firmware, R6700_firmware, R6900_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7300_firmware, R7900_firmware, R7900p_firmware, R8000_firmware, R8000p_firmware, R8300_firmware, R8500_firmware, Wndr3400_firmware, Wnr3500l_firmware, Xr500_firmware 6.8
2021-12-26 CVE-2021-45573 Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62. Ac2100_firmware, Ac2400_firmware, Ac2600_firmware, R6260_firmware, R6700_firmware, R6800_firmware, R6900_firmware, R7450_firmware 8.8
2020-07-28 CVE-2020-10927 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the encryption of firmware update images. The issue results from the use of an inappropriate encryption algorithm. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9649. R6700_firmware 8.8
2021-09-21 CVE-2021-40847 The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned... R6400v2_firmware, R6700_firmware, R6700v3_firmware, R6900_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7850_firmware, R7900_firmware, R8000_firmware, Rs400_firmware 8.1