{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T03:18:58.817","vulnerabilities":[{"cve":{"id":"CVE-2017-18842","sourceIdentifier":"cve@mitre.org","published":"2020-04-20T16:15:13.477","lastModified":"2024-11-21T03:21:04.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by CSRF. This affects R7300 before 1.0.0.54, R8500 before 1.0.2.94, DGN2200v1 before 1.0.0.55, and D2200D/D2200DW-1FRNAS before 1.0.0.32."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por un ataque de tipo CSRF. Esto afecta a R7300 versiones anteriores a 1.0.0.54, R8500 versiones anteriores a 1.0.2.94, DGN2200v1 versiones anteriores a 1.0.0.55, y D2200D/D2200DW-1FRNAS versiones anteriores a 1.0.0.32."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.54","matchCriteriaId":"D264AB39-63DD-4B32-9A91-D86A3700733D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7300:-:*:*:*:*:*:*:*","matchCriteriaId":"29B13F94-F151-4F00-95C3-D9FB22B3CC2B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.94","matchCriteriaId":"58EFB06D-AD59-4F40-B6EC-BD3C1BCACE7A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*","matchCriteriaId":"63500DE4-BDBD-4F86-AB99-7DB084D0B912"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.55","matchCriteriaId":"FC49A988-DE74-4CF5-92B8-F62466E21DD8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:dgn2200:v1:*:*:*:*:*:*:*","matchCriteriaId":"F50D834B-D7B3-43D6-8072-8992FBC8C97B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d2200d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.32","matchCriteriaId":"FFF16FE5-7D3D-4EC9-9654-A0F1C453CF9C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d2200d:-:*:*:*:*:*:*:*","matchCriteriaId":"27B9B784-975C-40C6-A2B5-B0954FDE904E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d2200dw-1frnas_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.32","matchCriteriaId":"B2775B88-84DE-456C-AAF0-4698FC4C32A9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d2200dw-1frnas:-:*:*:*:*:*:*:*","matchCriteriaId":"A2A420BD-C0B9-43C7-BE8B-E474CE23FA8C"}]}]}],"references":[{"url":"https://kb.netgear.com/000049017/Security-Advisory-for-a-Cross-Site-Request-Forgery-on-Some-Routers-DSL-Gateways-and-a-Modem-Router-PSV-2017-0327","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://kb.netgear.com/000049017/Security-Advisory-for-a-Cross-Site-Request-Forgery-on-Some-Routers-DSL-Gateways-and-a-Modem-Router-PSV-2017-0327","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}