{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T19:56:04.696","vulnerabilities":[{"cve":{"id":"CVE-2020-5621","sourceIdentifier":"vultures@jpcert.or.jp","published":"2020-08-28T05:15:11.277","lastModified":"2024-11-21T05:34:22.547","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in NETGEAR switching hubs (GS716Tv2 Firmware version 5.4.2.30 and earlier, and GS724Tv3 Firmware version 5.4.2.30 and earlier) allow remote attackers to hijack the authentication of administrators and alter the settings of the device via unspecified vectors."},{"lang":"es","value":"Una vulnerabilidad de tipo Cross-site request forgery (CSRF) en concentradores de conmutación NETGEAR (GS716Tv2  versiones de Firmware 5.4.2.30 y anteriores, y GS724Tv3  versiones de Firmware 5.4.2.30 y anteriores), permite a atacantes remotos secuestrar la autenticación de administradores y alterar la configuración del dispositivo por medio de vectores no especificados"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:gs716tv2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4.2.30","matchCriteriaId":"9E282109-F38D-4D61-9B18-B4CBB6CC91B8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:gs716t:v2:*:*:*:*:*:*:*","matchCriteriaId":"5B93D08F-4C7B-4DE6-A72A-5AAAC3E42F29"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:gs724tv3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4.2.30","matchCriteriaId":"2A4BD1ED-C45A-4308-B906-DA5359F49C7A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:gs724t:v3:*:*:*:*:*:*:*","matchCriteriaId":"15240AAD-9CDF-4E78-A43D-0AD0A21F0A05"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN29903998/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://jvn.jp/en/jp/JVN29903998/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.netgear.com/support/product/gs716Tv2.aspx","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"https://www.netgear.com/support/product/gs724tv3.aspx","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"http://jvn.jp/en/jp/JVN29903998/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://jvn.jp/en/jp/JVN29903998/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.netgear.com/support/product/gs716Tv2.aspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.netgear.com/support/product/gs724tv3.aspx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}