Product:

Rbk50v_firmware

(Netgear)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2021-08-11 CVE-2021-38514 Certain NETGEAR devices are affected by authentication bypass. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D6100 before 1.0.0.63, D6200 before 1.1.00.34, D6220 before 1.0.0.48, D6400 before 1.0.0.86, D7000 before 1.0.1.70, D7000v2 before 1.0.0.52, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200v4 before 1.0.0.108, DGND2200Bv4 before 1.0.0.108, EX2700 before 1.0.1.48, EX3700 before 1.0.0.76, EX3800 before 1.0.0.76, EX6000 before 1.0.0.38, EX6100... D3600_firmware, D6000_firmware, D6100_firmware, D6200_firmware, D6220_firmware, D6400_firmware, D7000_firmware, D7800_firmware, D8500_firmware, Dc112a_firmware, Dgn2200_firmware, Dgnd2200b_firmware, Ex2700_firmware, Ex3700_firmware, Ex3800_firmware, Ex6000_firmware, Ex6100_firmware, Ex6120_firmware, Ex6130_firmware, Ex6150_firmware, Ex6200_firmware, Ex6400_firmware, Ex7000_firmware, Ex7300_firmware, Ex8000_firmware, Jr6150_firmware, Pr2000_firmware, R6020_firmware, R6050_firmware, R6080_firmware, R6120_firmware, R6220_firmware, R6250_firmware, R6300_firmware, R6400_firmware, R6700_firmware, R6800_firmware, R6900_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7300dst_firmware, R7500_firmware, R7800_firmware, R7900_firmware, R7900p_firmware, R8000_firmware, R8000p_firmware, R8300_firmware, R8500_firmware, R9000_firmware, Rbk40_firmware, Rbk50_firmware, Rbk50v_firmware, Rbr40_firmware, Rbr50_firmware, Rbs40_firmware, Rbs40v_firmware, Rbs50_firmware, Rbw30_firmware, Wn2000rpt_firmware, Wn2500rp_firmware, Wn3000rp_firmware, Wn3100rp_firmware, Wndr3400_firmware, Wndr3700_firmware, Wndr4300_firmware, Wndr4500_firmware, Wnr2000_firmware, Wnr2020_firmware, Wnr2050_firmware, Wnr3500l_firmware, Xr500_firmware 2.7
2021-02-12 CVE-2020-27861 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076. Cbk40_firmware, Cbk43_firmware, Cbr40_firmware, Ex6200_firmware, Ex7700_firmware, Ex8000_firmware, Rbk12_firmware, Rbk13_firmware, Rbk14_firmware, Rbk15_firmware, Rbk20_router_firmware, Rbk20_satellite_firmware, Rbk20w_firmware, Rbk22_router_firmware, Rbk22_satellite_firmware, Rbk23_router_firmware, Rbk23_satellite_firmware, Rbk23w_firmware, Rbk30_firmware, Rbk33_firmware, Rbk40_router_firmware, Rbk40_satellite_firmware, Rbk43_router_firmware, Rbk43_satellite_firmware, Rbk43s_router_firmware, Rbk43s_satellite_firmware, Rbk44_router_firmware, Rbk44_satellite_firmware, Rbk50_firmware, Rbk50v_firmware, Rbk52w_firmware, Rbr10_firmware, Rbr20_firmware, Rbr40_firmware, Rbr50_firmware, Rbs10_firmware, Rbs20_firmware, Rbs40_firmware, Rbs50_firmware 8.8