Product:

Wndr4500_firmware

(Netgear)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 124
Date Id Summary Products Score Patch Annotated
2020-04-15 CVE-2019-20767 Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.60, D3600 before 1.0.0.75, D6000 before 1.0.0.75, R9000 before 1.0.4.26, R8900 before 1.0.4.26, R7800 before 1.0.2.52, WNDR4500v3 before 1.0.0.58, WNDR4300v2 before 1.0.0.58, WNDR4300 before 1.0.2.104, WNDR3700v4 before 1.0.2.102, and WNR2000v5 before 1.0.0.66. D3600_firmware, D6000_firmware, D6100_firmware, R7800_firmware, R8900_firmware, R9000_firmware, Wndr3700_firmware, Wndr4300_firmware, Wndr4500_firmware, Wnr2000_firmware N/A
2019-10-09 CVE-2019-17372 Certain NETGEAR devices allow remote attackers to disable all authentication requirements by visiting genieDisableLanChanged.cgi. The attacker can then, for example, visit MNU_accessPassword_recovered.html to obtain a valid new admin password. This affects AC1450, D8500, DC112A, JNDR3000, LG2200D, R4500, R6200, R6200V2, R6250, R6300, R6300v2, R6400, R6700, R6900P, R6900, R7000P, R7000, R7100LG, R7300, R7900, R8000, R8300, R8500, WGR614v10, WN2500RPv2, WNDR3400v2, WNDR3700v3, WNDR4000,... Ac1450_firmware, D8500_firmware, Dc112a_firmware, Jndr3000_firmware, Lg2200d_firmware, R4500_firmware, R6200_firmware, R6200v2_firmware, R6250_firmware, R6300_firmware, R6300v2_firmware, R6400_firmware, R6700_firmware, R6900_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7300_firmware, R7900_firmware, R8000_firmware, R8300_firmware, R8500_firmware, Wgr614v10_firmware, Wn2500rpv2_firmware, Wndr3400v2_firmware, Wndr3700v3_firmware, Wndr4000_firmware, Wndr4500_firmware, Wndr4500v2_firmware, Wnr1000_firmware, Wnr1000v3_firmware, Wnr3500l_firmware N/A
2018-07-24 CVE-2016-5638 There are few web pages associated with the genie app on the Netgear WNDR4500 running firmware version V1.0.1.40_1.0.6877. Genie app adds some capabilities over the Web GUI and can be accessed even when you are away from home. A remote attacker can access genie_ping.htm or genie_ping2.htm or genie_ping3.htm page without authentication. Once accessed, the page will be redirected to the aCongratulations2.htma page, which reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network... Wndr4500_firmware 7.5