Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Netgear:
Security Vulnerabilities
CVE-2022-44200
Netgear R7000P V1.3.0.8, V1.3.1.64 is vulnerable to Buffer Overflow via parameters: stamode_dns1_pri and stamode_dns1_sec.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44191
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameters KEY1 and KEY2.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44193
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameters: starthour, startminute , endhour, and endminute.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44194
Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameters apmode_dns1_pri and apmode_dns1_sec.
CVSS Score
9.8
EPSS Score
0.002
Published
2022-11-22
CVE-2022-44196
Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_push1.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44186
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_pri.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44187
Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via wan_dns1_pri.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44188
Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter enable_band_steering.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-44190
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-11-22
CVE-2022-42221
Netgear R6220 v1.1.0.114_1.0.1 suffers from Incorrect Access Control, resulting in a command injection vulnerability.
CVSS Score
8.8
EPSS Score
0.006
Published
2022-10-17
Prev
Next
Page 24
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved