Note:
This project will be discontinued after December 13, 2021. [more]
Product:
R6700_firmware
(Netgear)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 173 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-12-30 | CVE-2021-20173 | Netgear Nighthawk R6700 version 1.0.4.120 contains a command injection vulnerability in update functionality of the device. By triggering a system update check via the SOAP interface, the device is susceptible to command injection via preconfigured values. | R6700_firmware | 8.8 | ||
2021-12-30 | CVE-2021-20174 | Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the web interface. By default, all communication to/from the device's web interface is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext. | R6700_firmware | 7.5 | ||
2021-12-30 | CVE-2021-20175 | Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext | R6700_firmware | 7.5 | ||
2021-12-30 | CVE-2021-23147 | Netgear Nighthawk R6700 version 1.0.4.120 does not have sufficient protections for the UART console. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection and execute commands as the root user without authentication. | R6700_firmware | 6.8 | ||
2021-12-30 | CVE-2021-45077 | Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. | R6700_firmware | 7.5 | ||
2021-12-30 | CVE-2021-45732 | Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed. | R6700_firmware | 8.8 | ||
2023-03-29 | CVE-2022-27641 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was... | D7800_firmware, Ex6200_firmware, Ex8000_firmware, R6220_firmware, R6230_firmware, R6400_firmware, R6700_firmware, R7000_firmware, R7800_firmware | 8.8 | ||
2023-03-29 | CVE-2022-27642 | This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-15854. | Cax80_firmware, Lax20_firmware, Mr60_firmware, Mr80_firmware, Ms60_firmware, Ms80_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7850_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, R8500_firmware, Rax15_firmware, Rax200_firmware, Rax20_firmware, Rax35_firmware, Rax38_firmware, Rax40_firmware, Rax42_firmware, Rax43_firmware, Rax45_firmware, Rax48_firmware, Rax50_firmware, Rax50s_firmware, Rax75_firmware, Rax80_firmware, Rs400_firmware | 8.8 | ||
2023-03-29 | CVE-2022-27643 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of... | D6220_firmware, D6400_firmware, D7000v2_firmware, Dc112a_firmware, Ex3700_firmware, Ex3800_firmware, Ex6120_firmware, Ex6130_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7850_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, R8500_firmware, Rax200_firmware, Rax75_firmware, Rax80_firmware, Rs400_firmware, Wndr3400_firmware, Wnr3500l_firmware, Xr300_firmware | 8.8 | ||
2023-03-29 | CVE-2022-27644 | This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute... | Cbr40_firmware, Lbr1020_firmware, Lbr20_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7850_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, Rax200_firmware, Rax75_firmware, Rax80_firmware, Rbr10_firmware, Rbr20_firmware, Rbr40_firmware, Rbr50_firmware, Rbs10_firmware, Rbs20_firmware, Rbs40_firmware, Rbs50_firmware, Rs400_firmware | 8.8 |