{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T17:27:34.167","vulnerabilities":[{"cve":{"id":"CVE-2018-21133","sourceIdentifier":"cve@mitre.org","published":"2020-04-23T20:15:12.897","lastModified":"2024-11-21T04:02:58.807","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects WAC505 before 5.0.0.17 and WAC510 before 5.0.0.17."},{"lang":"es","value":"Determinados dispositivos NETGEAR se ven afectados por un desbordamiento del búfer basado en la pila por parte de un atacante no autenticado. Esto afecta al WAC505 antes de la versión 5.0.0.17 y al WAC510 antes de la versión 5.0.0.17."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.0.17","matchCriteriaId":"DD88C988-1EEA-4AB9-8132-C2DEE51E3E0B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*","matchCriteriaId":"7A51431E-AD34-4129-8E99-0A6BB8B7DF07"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.0.17","matchCriteriaId":"0111EBF7-07AF-4B2B-AEDD-BF797514B4E1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*","matchCriteriaId":"08B1B759-5015-4489-A2B4-0F580E884868"}]}]}],"references":[{"url":"https://kb.netgear.com/000060227/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0326","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://kb.netgear.com/000060227/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Wireless-Access-Points-PSV-2018-0326","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}