{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T23:32:11.568","vulnerabilities":[{"cve":{"id":"CVE-2021-45609","sourceIdentifier":"cve@mitre.org","published":"2021-12-26T01:15:18.130","lastModified":"2024-11-21T06:32:39.577","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D8500 before 1.0.3.58, R6250 before 1.0.4.48, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7900 before 1.0.4.38, R8300 before 1.0.2.144, R8500 before 1.0.2.144, XR300 before 1.0.3.68, R7000P before 1.3.2.132, and R6900P before 1.3.2.132."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer por parte de un atacante no autenticado. Esto afecta a D8500 versiones anteriores a 1.0.3.58, a R6250 versiones anteriores a 1.0.4.48, a R7000 versiones anteriores a 1.0.11.116, a R7100LG versiones anteriores a 1.0.0.64, a R7900 versiones anteriores a 1.0.4.38, a R8300 versiones anteriores a 1.0.2.144, a R8500 versiones anteriores a 1.0.2.144, al XR300 versiones anteriores a 1.0.3.68, a R7000P versiones anteriores a 1.3.2.132 y a R6900P versiones anteriores a 1.3.2.132"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.58","matchCriteriaId":"0E1D0A84-92A5-4E07-B2BB-ED4431E64457"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*","matchCriteriaId":"814A0114-9A1D-4EA0-9AF4-6968514E4F01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.48","matchCriteriaId":"049629DD-9E4F-4F47-98B0-C9FD457B74A0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*","matchCriteriaId":"321BE843-52C4-4638-A321-439CA7B3A6F2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.11.116","matchCriteriaId":"D9F1DAD0-F8B8-48D5-B571-C55636B274C3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*","matchCriteriaId":"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.132","matchCriteriaId":"EAF3EA40-79FB-4D2C-A8AF-A04820745C4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*","matchCriteriaId":"DFE55F4D-E98B-46D3-B870-041141934CD1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.132","matchCriteriaId":"839A9EBE-5F14-4695-8040-7D5607F8E248"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*","matchCriteriaId":"C41908FF-AE64-4949-80E3-BEE061B2DA8A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.38","matchCriteriaId":"96390A31-03B8-477B-8710-F797CB44E741"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*","matchCriteriaId":"C484840F-AF30-4B5C-821A-4DB9BE407BDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.144","matchCriteriaId":"60634A15-B02A-4C33-A1A4-F6340CFD6B8B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*","matchCriteriaId":"7A9B77E7-7439-48C6-989F-5E22CB4D3044"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.144","matchCriteriaId":"F8E565CF-8408-4502-97BD-01CEF15D0744"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*","matchCriteriaId":"63500DE4-BDBD-4F86-AB99-7DB084D0B912"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.64","matchCriteriaId":"1AC36017-5BCF-4CF6-91D0-278279943847"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*","matchCriteriaId":"366FA778-3C2A-42AF-9141-DAD7043B406C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.68","matchCriteriaId":"3AE70236-D1C6-4B58-8385-1FA5F71916AF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*","matchCriteriaId":"5590CF28-B88A-4755-904B-1BC1778FBEDD"}]}]}],"references":[{"url":"https://kb.netgear.com/000064483/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0274","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://kb.netgear.com/000064483/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0274","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}