{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T10:00:56.522","vulnerabilities":[{"cve":{"id":"CVE-2017-18805","sourceIdentifier":"cve@mitre.org","published":"2020-04-21T18:15:12.593","lastModified":"2024-11-21T03:20:58.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por una inyección de comando. Esto afecta a WAC510 versiones anteriores a la versión  1.3.0.10, WAC120 versiones anteriores a la versión  2.1.4, WNDAP620 versiones anteriores a la versión 2.1.3, WND930 versiones anteriores a la versión 2.1.2, WN604 versiones anteriores a la 3.3. 7, WNDAP660 versiones anteriores a 3.7.4.0, WNDAP350 versiones anteriores a 3.7.4.0, WNAP320 versiones anteriores a 3.7.4.0, WNAP210v2 versiones anteriores a 3.7.4.0, y WNDAP360 versiones anteriores a 3.7.4.0."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0.10","matchCriteriaId":"806B48FE-912E-488A-A89A-3321BF14B351"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*","matchCriteriaId":"08B1B759-5015-4489-A2B4-0F580E884868"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.4","matchCriteriaId":"AD64ACCC-A1E0-4D9F-B6E4-8AB8AD7936E5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*","matchCriteriaId":"A8E5414D-8F4F-4E21-B79F-61B14F0C9990"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.3","matchCriteriaId":"9267B577-EF4D-43A5-BC91-CB363F8EA421"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*","matchCriteriaId":"666A5E55-B07C-4615-A9F0-5CA8C7D40637"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.2","matchCriteriaId":"6E7CFEDD-259B-4E40-9308-A071D236D4C7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*","matchCriteriaId":"91593610-E45D-450B-AD40-74375DA37EF6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.7","matchCriteriaId":"BEBD44BB-11A5-45C8-A675-E9CBBB31C48F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*","matchCriteriaId":"CD31DCAA-BAA5-4463-9EA4-A7076A625407"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.4.0","matchCriteriaId":"965D072C-3F4F-49EB-93DB-377E91372214"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*","matchCriteriaId":"58D2492E-0CDC-4242-9206-7F0453B11CBD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.4.0","matchCriteriaId":"7E3E920F-B954-4D9F-A918-214A00785A9A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*","matchCriteriaId":"C82A16C2-DC48-4792-A4C7-8AC43F84196D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.4.0","matchCriteriaId":"C1B6AA52-F11E-4836-AF1D-7682FBD56CA4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*","matchCriteriaId":"5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.4.0","matchCriteriaId":"AFC5C872-DEC5-47EF-AA32-7D82E8DB9E48"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*","matchCriteriaId":"B442489B-A88F-477C-A835-2081891A15CE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.4.0","matchCriteriaId":"E46CB6AD-BCE4-4A82-B2CC-22190AEB2F3B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*","matchCriteriaId":"7975D6EC-1816-4D52-8C87-77C1B6404120"}]}]}],"references":[{"url":"https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://kb.netgear.com/000049060/Security-Advisory-for-Command-Injection-Vulnerability-on-Some-Wireless-Access-Points-PSV-2017-2213","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}