| Vulnerability Name: | CVE-2022-44193 | ||||||
| Assigned: | 2022-11-22 | ||||||
| Published: | 2022-11-22 | ||||||
| Updated: | 2022-11-23 | ||||||
| Summary: | Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameters: starthour, startminute , endhour, and endminute. | ||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
| ||||||
| CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||
| Vulnerability Type: | CWE-787 | ||||||
| References: | Source: MITRE Type: CNA CVE-2022-44193 Source: MISC Type: Exploit, Third Party Advisory https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/10 Source: MISC Type: Vendor Advisory https://www.netgear.com/about/security/ | ||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||