Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Xwn5001_firmware
(Netgear)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-12-20 | CVE-2022-46424 | An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier. | Xwn5001_firmware | 8.1 | ||
2023-08-07 | CVE-2023-39550 | Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the check_auth function. | Jwnr2000v2_firmware, Xavn2001v2_firmware, Xwn5001_firmware | 8.8 | ||
2023-08-07 | CVE-2023-38922 | Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the update_auth function. | Jwnr2000v2_firmware, Xavn2001v2_firmware, Xwn5001_firmware | 8.8 |