Note:
This project will be discontinued after December 13, 2021. [more]
Product:
R7000p_firmware
(Netgear)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 124 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-11-22 | CVE-2022-44186 | Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_pri. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44187 | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via wan_dns1_pri. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44190 | Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44188 | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter enable_band_steering. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44191 | Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameters KEY1 and KEY2. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44193 | Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameters: starthour, startminute , endhour, and endminute. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44194 | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameters apmode_dns1_pri and apmode_dns1_sec. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44197 | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44196 | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_push1. | R7000p_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44198 | Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_push1. | R7000p_firmware | 9.8 |