{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T05:29:04.023","vulnerabilities":[{"cve":{"id":"CVE-2021-45573","sourceIdentifier":"cve@mitre.org","published":"2021-12-26T01:15:16.463","lastModified":"2024-11-21T06:32:33.547","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer en la región stack de la memoria por parte de un atacante no autenticado. Esto afecta a R6260 versiones anteriores a 1.1.0.76, a R6800 versiones anteriores a 1.2.0.62, a R6700v2 versiones anteriores a 1.2.0.62, a R6900v2 versiones anteriores a 1.2.0.62, a R7450 versiones anteriores a 1.2.0.62, al AC2100 versiones anteriores a 1.2.0.62, al AC2400 versiones anteriores a 1.2.0.62 y al AC2600 versiones anteriores a 1.2.0.62"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:P/I:P/A:P","baseScore":5.8,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.5,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0.76","matchCriteriaId":"23D4F7E6-C042-434E-87B8-55DB18B08B0A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*","matchCriteriaId":"3C395D49-57F9-4BC1-8619-57127355B86B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"812D595B-5EDD-443F-8169-EF802C44DE2C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*","matchCriteriaId":"09404083-B00B-4C1F-8085-BC242E625CA3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"E14FFFEC-36DE-4101-9735-9799EE5F688F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*","matchCriteriaId":"9F9706E6-CA53-43E4-91B0-D52655C86860"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"92EF8E66-8A36-411B-A1A0-CAD94A122C5B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*","matchCriteriaId":"2E8EB69B-6619-47B6-A073-D0B840D4EB0B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"C2428BDA-BF24-4CB7-8534-C7ADF96EF3DC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*","matchCriteriaId":"6DA5420D-DD64-4A9C-9B5F-784F0ED2B464"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"25314438-D37F-4A87-953A-4661172C75E8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*","matchCriteriaId":"A80B06A1-81B5-4C33-89F6-EC3F6E3068B5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"1181818D-D6E2-416E-A7B0-06259230F1A1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*","matchCriteriaId":"6B25A18F-DD96-45FE-B098-71E60CB0FFFE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"26B17DB2-91A0-4B9D-9A6A-608A3955184E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*","matchCriteriaId":"2BFCD9A8-1846-48C4-9F14-3866E983FB74"}]}]}],"references":[{"url":"https://kb.netgear.com/000064095/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0081","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://kb.netgear.com/000064095/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0081","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}