VYPR

Netgear Nighthawk Wifi6 Router

by Chatwoot

CVEs (8)

  • CVE-2023-27850Mar 10, 2023
    risk 0.00cvss epss 0.00

    NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that allows users with access to this feature to access arbitrary files on the device.

  • CVE-2023-27852Mar 10, 2023
    risk 0.00cvss epss 0.01

    NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerability in various CGI mechanisms that could allow an attacker to execute arbitrary code on the device.

  • CVE-2023-27851Mar 10, 2023
    risk 0.00cvss epss 0.01

    NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that unintentionally allows users with upload permissions to execute arbitrary code on the device.

  • CVE-2023-27853Mar 10, 2023
    risk 0.00cvss epss 0.01

    NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a format string vulnerability in a SOAP service that could allow an attacker to execute arbitrary code on the device.

  • CVE-2023-1205Mar 10, 2023
    risk 0.00cvss epss 0.00

    NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 is vulnerable to cross-site request forgery attacks on all endpoints due to improperly implemented CSRF protections.

  • CVE-2022-47208Dec 16, 2022
    risk 0.00cvss epss 0.01

    The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.

  • CVE-2022-47210Dec 16, 2022
    risk 0.00cvss epss 0.00

    The default console presented to users over telnet (when enabled) is restricted to a subset of commands. Commands issued at this console, however, appear to be fed directly into a system call or other similar function. This allows any authenticated user to execute arbitrary commands on the device.

  • CVE-2022-47209Dec 16, 2022
    risk 0.00cvss epss 0.00

    A support user exists on the device and appears to be a backdoor for Technical Support staff. The default password for this account is “support” and cannot be changed by a user via any normally accessible means.