{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T11:42:11.860","vulnerabilities":[{"cve":{"id":"CVE-2021-45637","sourceIdentifier":"cve@mitre.org","published":"2021-12-26T01:15:19.507","lastModified":"2024-11-21T06:32:44.553","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62."},{"lang":"es","value":"Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer en la región stack de la memoria por parte de un atacante no autenticado. Esto afecta a R6260 versiones anteriores a 1.1.0.76, a R6800 versiones anteriores a 1.2.0.62, a R6700v2 versiones anteriores a 1.2.0.62, a R6900v2 versiones anteriores a 1.2.0.62, a R7450 versiones anteriores a 1.2.0.62, al AC2100 versiones anteriores a 1.2.0.62, al AC2400 versiones anteriores a 1.2.0.62 y al AC2600 versiones anteriores a 1.2.0.62"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0.76","matchCriteriaId":"23D4F7E6-C042-434E-87B8-55DB18B08B0A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*","matchCriteriaId":"3C395D49-57F9-4BC1-8619-57127355B86B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"812D595B-5EDD-443F-8169-EF802C44DE2C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*","matchCriteriaId":"09404083-B00B-4C1F-8085-BC242E625CA3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"1A3E4091-5CDD-4C35-84B9-C4BAF2B8FA4F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*","matchCriteriaId":"C9793286-86D2-43BF-B9B8-823C05BCAE4B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"FF0079DC-7F71-4B0D-B9A9-3193F88723C0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*","matchCriteriaId":"A9FC6398-60A5-4003-A294-C96AE6DBCED5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"C2428BDA-BF24-4CB7-8534-C7ADF96EF3DC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*","matchCriteriaId":"6DA5420D-DD64-4A9C-9B5F-784F0ED2B464"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"25314438-D37F-4A87-953A-4661172C75E8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*","matchCriteriaId":"A80B06A1-81B5-4C33-89F6-EC3F6E3068B5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"1181818D-D6E2-416E-A7B0-06259230F1A1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*","matchCriteriaId":"6B25A18F-DD96-45FE-B098-71E60CB0FFFE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.62","matchCriteriaId":"26B17DB2-91A0-4B9D-9A6A-608A3955184E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*","matchCriteriaId":"2BFCD9A8-1846-48C4-9F14-3866E983FB74"}]}]}],"references":[{"url":"https://kb.netgear.com/000064059/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2019-0081","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://kb.netgear.com/000064059/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2019-0081","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}