{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T04:10:26.419","vulnerabilities":[{"cve":{"id":"CVE-2021-45529","sourceIdentifier":"cve@mitre.org","published":"2021-12-26T01:15:14.303","lastModified":"2024-11-21T06:32:25.980","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects CBR40 before 2.3.5.12, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, R6400 before 1.0.1.70, R7000 before 1.0.11.126, R6900P before 1.3.2.124, R7000P before 1.3.2.124, R7900 before 1.0.4.30, R8000 before 1.0.4.52, and WNR3500Lv2 before 1.2.0.62."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer por parte de un usuario autenticado. Esto afecta a CBR40 versiones anteriores a 2.3.5.12, D7000v2 versiones anteriores a 1.0.0.66, D8500 versiones anteriores a 1.0.3.58, R6400 versiones anteriores a 1.0.1.70, R7000 versiones anteriores a 1.0.11 126, R6900P versiones anteriores a 1.3.2.124, R7000P versiones anteriores a 1.3.2.124, R7900 versiones anteriores a 1.0.4.30, R8000 versiones anteriores a 1.0.4.52 y WNR3500Lv2 versiones anteriores a 1.2.0.62"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.5.12","matchCriteriaId":"2137429A-75AD-44EE-A898-31684CB3A0B2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*","matchCriteriaId":"AE0F7E9E-196C-4106-B1C9-C16FA5910A0F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.66","matchCriteriaId":"FB6EE3C6-6BA3-4D37-B43B-B98E6EDFDD41"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*","matchCriteriaId":"6DC6BD34-1A2C-4247-A20C-0B44C0F56E0F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.58","matchCriteriaId":"0E1D0A84-92A5-4E07-B2BB-ED4431E64457"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*","matchCriteriaId":"814A0114-9A1D-4EA0-9AF4-6968514E4F01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.70","matchCriteriaId":"CA1BB56F-20B5-4A79-AE9D-429A011EAA4C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*","matchCriteriaId":"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.11.126","matchCriteriaId":"A0E06EFF-9D71-43DB-A304-9A41998FD68A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*","matchCriteriaId":"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.124","matchCriteriaId":"5C6F506A-464D-4BDE-8F9B-D537D3C7E137"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*","matchCriteriaId":"DFE55F4D-E98B-46D3-B870-041141934CD1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.124","matchCriteriaId":"61DE3850-1661-43D1-9E52-31E2E01979EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*","matchCriteriaId":"C41908FF-AE64-4949-80E3-BEE061B2DA8A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.30","matchCriteriaId":"B6364559-B141-43AE-B40A-506B79BCC3AA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*","matchCriteriaId":"C484840F-AF30-4B5C-821A-4DB9BE407BDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.52","matchCriteriaId":"9D444B09-82DA-4225-A292-B28232408A7B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*","matchCriteriaId":"5B39F095-8FE8-43FD-A866-7B613B495984"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:wnr3500lv2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"F667392E-F63E-4186-9BA3-7F9A4AA3EC67"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:wnr3500lv2:-:*:*:*:*:*:*:*","matchCriteriaId":"FC3F6D58-D900-41B4-8626-58928866208A"}]}]}],"references":[{"url":"https://kb.netgear.com/000064058/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2019-0077","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://kb.netgear.com/000064058/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2019-0077","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}