{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T17:13:30.205","vulnerabilities":[{"cve":{"id":"CVE-2021-45525","sourceIdentifier":"cve@mitre.org","published":"2021-12-26T01:15:14.107","lastModified":"2024-11-21T06:32:25.277","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects EX7000 before 1.0.1.80, R6400 before 1.0.1.50, R6400v2 before 1.0.4.118, R6700 before 1.0.2.8, R6700v3 before 1.0.4.118, R6900 before 1.0.2.8, R6900P before 1.3.2.124, R7000 before 1.0.9.88, R7000P before 1.3.2.124, R7900 before 1.0.3.18, R7900P before 1.4.1.50, R8000 before 1.0.4.46, R8000P before 1.4.1.50, RAX80 before 1.0.1.56, and WNR3500Lv2 before 1.2.0.62."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer por parte de un usuario autenticado. Esto afecta a EX7000 versiones anteriores a 1.0.1.80, a R6400 versiones anteriores a 1.0.1.50, a R6400v2 versiones anteriores a 1.0.4.118, a R6700 versiones anteriores a 1.0.2.8, a R6700v3 versiones anteriores a 1.0.4.118, a R6900 versiones anteriores a 1.0.2.8, a R6900P versiones anteriores a 1.3.2.124, a R7000 versiones anteriores a 1.0.9.88, a R775 versiones anteriores a 1.0.3.88. 0.9.88, R7000P versiones anteriores a 1.3.2.124, R7900 versiones anteriores a 1.0.3.18, R7900P versiones anteriores a 1.4.1.50, R8000 versiones anteriores a 1.0.4.46, R8000P versiones anteriores a 1.4.1.50, RAX80 versiones anteriores a 1.0.1.56 y WNR3500Lv2 versiones anteriores a 1.2.0.62"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.80","matchCriteriaId":"A4C13370-1814-4CD1-89E8-080DC2328A30"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*","matchCriteriaId":"9F45B620-60B8-40F3-A055-181ADD71EFFF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.50","matchCriteriaId":"27C41AA7-C24A-49C6-98D9-B1CB2173705F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*","matchCriteriaId":"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.118","matchCriteriaId":"0095B9D4-E161-4050-B283-2166CB86CB24"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*","matchCriteriaId":"AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.8","matchCriteriaId":"64C3A900-C9B1-4D4A-B62E-810DC705DC47"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*","matchCriteriaId":"21B27F11-4262-4CE1-8107-B365A7C152F2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.118","matchCriteriaId":"0702F9B6-2DAC-4308-8737-9F85AD28E847"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*","matchCriteriaId":"C88DA385-5FAE-49EC-80D6-78F81E7EEC16"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.8","matchCriteriaId":"F7A5B4B9-59B9-44EE-86C7-099F4F94236D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*","matchCriteriaId":"0794BB7C-1BCF-4F08-8EB2-9C3B150C105A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.124","matchCriteriaId":"61DE3850-1661-43D1-9E52-31E2E01979EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*","matchCriteriaId":"C41908FF-AE64-4949-80E3-BEE061B2DA8A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.9.88","matchCriteriaId":"A1FA71CB-0E14-4CBE-99BC-FD94FF4E4FBD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*","matchCriteriaId":"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.124","matchCriteriaId":"5C6F506A-464D-4BDE-8F9B-D537D3C7E137"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*","matchCriteriaId":"DFE55F4D-E98B-46D3-B870-041141934CD1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.18","matchCriteriaId":"7C4F628F-93D4-4C76-9D84-0D70B0C2E67B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*","matchCriteriaId":"C484840F-AF30-4B5C-821A-4DB9BE407BDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.1.50","matchCriteriaId":"8B02CB0A-BBB8-4A64-93B3-7CA1DF7B7299"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*","matchCriteriaId":"F3D6A70D-66AF-4064-9F1B-4358D4B1F016"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.46","matchCriteriaId":"35801B9D-59EA-4E23-8460-F2AAD4B4DEB0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*","matchCriteriaId":"5B39F095-8FE8-43FD-A866-7B613B495984"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.1.50","matchCriteriaId":"9D3F1622-F2B7-41F0-87F0-61F4ACB270C8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*","matchCriteriaId":"F7EF872D-2537-4FEB-8799-499FC9D44339"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.56","matchCriteriaId":"D0B91F64-BEFB-4632-81A8-C584EB5EF1F1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*","matchCriteriaId":"06B5A85C-3588-4263-B9AD-4E56D3F6CB16"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnr3500lv2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"F667392E-F63E-4186-9BA3-7F9A4AA3EC67"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnr3500lv2:-:*:*:*:*:*:*:*","matchCriteriaId":"FC3F6D58-D900-41B4-8626-58928866208A"}]}]}],"references":[{"url":"https://kb.netgear.com/000064052/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Extenders-PSV-2018-0618","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://kb.netgear.com/000064052/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Extenders-PSV-2018-0618","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}