Note:
This project will be discontinued after December 13, 2021. [more]
Product:
R6700_firmware
(Netgear)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 173 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2016-12-14 | CVE-2016-6277 | NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. | D6220_firmware, D6400_firmware, R6250_firmware, R6400_firmware, R6700_firmware, R6900_firmware, R7000_firmware, R7100lg_firmware, R7300dst_firmware, R7900_firmware, R8000_firmware | 8.8 | ||
2023-04-26 | CVE-2023-30280 | Buffer Overflow vulnerability found in Netgear R6900 v.1.0.2.26, R6700v3 v.1.0.4.128, R6700 v.1.0.0.26 allows a remote attacker to execute arbitrary code and cause a denial ofservice via the getInputData parameter of the fwSchedule.cgi page. | R6700_firmware, R6900_firmware | 9.8 | ||
2023-06-06 | CVE-2023-33533 | Netgear D6220 with Firmware Version 1.0.0.80, D8500 with Firmware Version 1.0.3.60, R6700 with Firmware Version 1.0.2.26, and R6900 with Firmware Version 1.0.2.26 are vulnerable to Command Injection. If an attacker gains web management privileges, they can inject commands into the post request parameters, gaining shell privileges. | D6220_firmware, D8500_firmware, R6700_firmware, R6900_firmware | 8.8 |