Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Wnr1000v2_firmware
(Netgear)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-02-02 | CVE-2023-23110 | An exploitable firmware modification vulnerability was discovered in certain Netgear products. The data integrity of the uploaded firmware image is ensured with a fixed checksum number. Therefore, an attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the checksum verification. This affects WNR612v2 Wireless Routers 1.0.0.3 and earlier, DGN1000v3 Modem Router 1.0.0.22 and earlier, D6100 WiFi DSL Modem Routers 1.0.0.63 and earlier, WNR1000v2 Wireless... | D6100_firmware, Dgn1000v3_firmware, R8900_firmware, R9000_firmware, Wnr1000v2_firmware, Wnr2200_firmware, Wnr2500_firmware, Wnr612v2_firmware, Xavn2001v2_firmware | 7.4 | ||
2017-01-30 | CVE-2016-10174 | The NETGEAR WNR2000v5 router contains a buffer overflow in the hidden_lang_avi parameter when invoking the URL /apply.cgi?/lang_check.html. This buffer overflow can be exploited by an unauthenticated attacker to achieve remote code execution. | D6100_firmware, D7000_firmware, D7800_firmware, Jnr1010v2_firmware, Jnr3300_firmware, Jwnr2010v5_firmware, R2000_firmware, R6100_firmware, R6220_firmware, R7500_firmware, R7500v2_firmware, Wndr3700v4_firmware, Wndr3800_firmware, Wndr4300_firmware, Wndr4300v2_firmware, Wndr4500v3_firmware, Wndr4700_firmware, Wnr1000v2_firmware, Wnr1000v4_firmware, Wnr2000v3_firmware, Wnr2000v4_firmware, Wnr2000v5_firmware, Wnr2020_firmware, Wnr2050_firmware, Wnr2200_firmware, Wnr2500_firmware, Wnr614_firmware, Wnr618_firmware | 9.8 |