{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T14:38:34.749","vulnerabilities":[{"cve":{"id":"CVE-2018-21120","sourceIdentifier":"cve@mitre.org","published":"2020-04-22T16:15:11.903","lastModified":"2024-11-21T04:02:56.987","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por una vulnerabilidad de tipo CSRF. Esto afecta a WAC120 versiones anteriores a 2.1.7, WAC505 versiones anteriores a 5.0.5.4, WAC510 versiones anteriores a 5.0.5.4, WNAP320 versiones anteriores a 3.7.11.4, WNAP210v2 versiones anteriores a 3.7.11.4, WNDAP350 versiones anteriores a 3.7.11.4, WNDAP360 versiones anteriores a 3.7.11.4, WNDAP660 versiones anteriores a 3.7.11.4, WNDAP620 versiones anteriores a 2.1.7, WND930 versiones anteriores a 2.1.5 y WN604 versiones anteriores a 3.3.10."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}],"cvssMetricV30":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","baseScore":5.2,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6.0,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.7","matchCriteriaId":"8ED872A8-5B73-406B-8044-B1BD50A881EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*","matchCriteriaId":"A8E5414D-8F4F-4E21-B79F-61B14F0C9990"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.5.4","matchCriteriaId":"2E3819D8-D7C6-4491-BCCC-C6ED67C815DF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*","matchCriteriaId":"7A51431E-AD34-4129-8E99-0A6BB8B7DF07"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.5.4","matchCriteriaId":"755E4AE7-BAC6-4526-B6F4-320CE8D319A6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*","matchCriteriaId":"08B1B759-5015-4489-A2B4-0F580E884868"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.11.4","matchCriteriaId":"DFC83243-B576-43FA-9339-90FF51DA75B6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*","matchCriteriaId":"5E2613E9-CAF9-4C04-85BC-E10BDF4B0E74"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.11.4","matchCriteriaId":"2A66070C-92C0-45CD-A46F-64008E3D2268"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*","matchCriteriaId":"B442489B-A88F-477C-A835-2081891A15CE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.11.4","matchCriteriaId":"7A80C76F-0F02-43E7-87D3-FCC0898B99B8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*","matchCriteriaId":"C82A16C2-DC48-4792-A4C7-8AC43F84196D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.11.4","matchCriteriaId":"2D9BBA36-7705-4829-BD87-2B505E380C3B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*","matchCriteriaId":"7975D6EC-1816-4D52-8C87-77C1B6404120"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.11.4","matchCriteriaId":"A24DDCC0-D625-4810-A7E7-4AAC705F034E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*","matchCriteriaId":"58D2492E-0CDC-4242-9206-7F0453B11CBD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.7","matchCriteriaId":"992B6FDF-8FC7-4ACF-BCB2-73C8D91ABB80"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*","matchCriteriaId":"666A5E55-B07C-4615-A9F0-5CA8C7D40637"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.5","matchCriteriaId":"A282C49C-684B-4722-A6AC-CF2131F572A3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*","matchCriteriaId":"91593610-E45D-450B-AD40-74375DA37EF6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.10","matchCriteriaId":"918C4D1C-A684-47AD-AA42-926715D8568A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*","matchCriteriaId":"CD31DCAA-BAA5-4463-9EA4-A7076A625407"}]}]}],"references":[{"url":"https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://kb.netgear.com/000060238/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Wireless-Access-Points-PSV-2018-0095","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}