Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
AC2100 Hardware solutions / Routers for home users AC2400 Hardware solutions / Routers for home users R6700v2 Hardware solutions / Routers for home users R6900v2 Hardware solutions / Routers for home users R7200 Hardware solutions / Routers for home users R7350 Hardware solutions / Routers for home users R7400 Hardware solutions / Routers for home users R7450 Hardware solutions / Routers for home users D7000 Hardware solutions / Routers & switches, VoIP, GSM, etc R6120 Hardware solutions / Routers & switches, VoIP, GSM, etc R6220 Hardware solutions / Routers & switches, VoIP, GSM, etc R6230 Hardware solutions / Routers & switches, VoIP, GSM, etc R6260 Hardware solutions / Routers & switches, VoIP, GSM, etc R6330 Hardware solutions / Routers & switches, VoIP, GSM, etc R6350 Hardware solutions / Routers & switches, VoIP, GSM, etc R6850 Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | NETGEAR |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU61928
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: N/A
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAC2100: before 1.2.0.90
AC2400: before 1.2.0.90
D7000: before 1.0.1.84
R6120: before 1.0.0.82
R6220: before 1.1.0.112
R6230: before 1.1.0.112
R6260: before 1.1.0.86
R6330: before 1.1.0.86
R6350: before 1.1.0.86
R6700v2: before 1.2.0.90
R6850: before 1.1.0.86
R6900v2: before 1.2.0.90
R7200: before 1.2.0.90
R7350: before 1.2.0.90
R7400: before 1.2.0.90
R7450: before 1.2.0.90
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.