{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T11:56:24.245","vulnerabilities":[{"cve":{"id":"CVE-2021-45624","sourceIdentifier":"cve@mitre.org","published":"2021-12-26T01:15:18.917","lastModified":"2024-11-21T06:32:42.523","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, R7000 before 1.0.11.110, R7100LG before 1.0.0.72, R7900 before 1.0.4.30, R8000 before 1.0.4.62, XR300 before 1.0.3.56, R7000P before 1.3.2.132, R8500 before 1.0.2.144, R6900P before 1.3.2.132, and R8300 before 1.0.2.144."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por una inyección de comandos por parte de un atacante no autenticado. Esto afecta a D7000v2 versiones anteriores a 1.0.0.66, D8500 versiones anteriores a 1.0.3.58, R7000 versiones anteriores a 1.0.11.110, R7100LG versiones anteriores a 1.0.0.72, R7900 versiones anteriores a 1.0.4.30, R8000 versiones anteriores a 1. 0.4.62, XR300 versiones anteriores a 1.0.3.56, R7000P versiones anteriores a 1.3.2.132, R8500 versiones anteriores a 1.0.2.144, R6900P versiones anteriores a 1.3.2.132 y R8300 versiones anteriores a 1.0.2.144"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.66","matchCriteriaId":"FB6EE3C6-6BA3-4D37-B43B-B98E6EDFDD41"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*","matchCriteriaId":"6DC6BD34-1A2C-4247-A20C-0B44C0F56E0F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.58","matchCriteriaId":"0E1D0A84-92A5-4E07-B2BB-ED4431E64457"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*","matchCriteriaId":"814A0114-9A1D-4EA0-9AF4-6968514E4F01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.11.110","matchCriteriaId":"82B05B23-A689-4A0A-8569-9FA7972EA663"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*","matchCriteriaId":"C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0.72","matchCriteriaId":"F445F83B-1CFC-41E9-9446-72E1FCE5A222"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*","matchCriteriaId":"366FA778-3C2A-42AF-9141-DAD7043B406C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.30","matchCriteriaId":"B6364559-B141-43AE-B40A-506B79BCC3AA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*","matchCriteriaId":"C484840F-AF30-4B5C-821A-4DB9BE407BDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4.62","matchCriteriaId":"A6C5E300-92E2-447A-822F-B95D1C59530E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*","matchCriteriaId":"5B39F095-8FE8-43FD-A866-7B613B495984"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3.56","matchCriteriaId":"4AF96D62-1D28-4FE5-AFC3-FB93A1BB4D45"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*","matchCriteriaId":"5590CF28-B88A-4755-904B-1BC1778FBEDD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.132","matchCriteriaId":"EAF3EA40-79FB-4D2C-A8AF-A04820745C4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*","matchCriteriaId":"DFE55F4D-E98B-46D3-B870-041141934CD1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.144","matchCriteriaId":"F8E565CF-8408-4502-97BD-01CEF15D0744"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*","matchCriteriaId":"63500DE4-BDBD-4F86-AB99-7DB084D0B912"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.2.132","matchCriteriaId":"839A9EBE-5F14-4695-8040-7D5607F8E248"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*","matchCriteriaId":"C41908FF-AE64-4949-80E3-BEE061B2DA8A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.2.144","matchCriteriaId":"60634A15-B02A-4C33-A1A4-F6340CFD6B8B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*","matchCriteriaId":"7A9B77E7-7439-48C6-989F-5E22CB4D3044"}]}]}],"references":[{"url":"https://kb.netgear.com/000064485/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-PSV-2020-0298","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://kb.netgear.com/000064485/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-PSV-2020-0298","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}