CVE-2021-29068

CVSS V2 Medium 6.5 CVSS V3 High 8.8
Description
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R6700v3 before 1.0.4.98, R6400v2 before 1.0.4.98, R7000 before 1.0.11.106, R6900P before 1.3.2.124, R7000P before 1.3.2.124, R7900 before 1.0.4.26, R7850 before 1.0.5.60, R8000 before 1.0.4.58, RS400 before 1.5.0.48, R6400 before 1.0.1.62, R6700 before 1.0.2.16, R6900 before 1.0.2.16, MK60 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, CBR40 before 2.5.0.10, R8000P before 1.4.1.62, R7960P before 1.4.1.62, R7900P before 1.4.1.62, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, EX7500 before 1.0.0.68, EAX80 before 1.0.1.62, EAX20 before 1.0.0.36, RBK752 before 3.2.16.6, RBK753 before 3.2.16.6, RBK753S before 3.2.16.6, RBK754 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBK853 before 3.2.16.6, RBK854 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6850 before 1.1.0.76, R6350 before 1.1.0.76, R6330 before 1.1.0.76, D7800 before 1.0.1.58, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK40 before 2.6.1.36, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK23 before 2.6.1.36, RBR20 before 2.6.1.38, RBS20 before 2.6.1.38, RBK12 before 2.6.1.44, RBK13 before 2.6.1.44, RBK14 before 2.6.1.44, RBK15 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, R6800 before 1.2.0.72, R6900v2 before 1.2.0.72, R6700v2 before 1.2.0.72, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, R7800 before 1.0.2.74, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, XR450 before 2.3.2.66, XR500 before 2.3.2.66, XR700 before 1.0.1.34, and XR300 before 1.0.3.50.
Overview
  • CVE ID
  • CVE-2021-29068
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-03-23T07:15:13
  • Last Modified Date
  • 2021-03-27T01:23:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.4.98
cpe:2.3:h:netgear:r6700:v3:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.4.98
cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.11.106
cpe:2.3:h:netgear:r7000:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:* 1 OR 1.3.2.124
cpe:2.3:h:netgear:r6900p:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:* 1 OR 1.3.2.124
cpe:2.3:h:netgear:r7000p:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.4.26
cpe:2.3:h:netgear:r7900:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.5.60
cpe:2.3:h:netgear:r7850:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.4.58
cpe:2.3:h:netgear:r8000:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:* 1 OR 1.5.0.48
cpe:2.3:h:netgear:rs400:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.62
cpe:2.3:h:netgear:r6400:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.2.16
cpe:2.3:h:netgear:r6700:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.2.16
cpe:2.3:h:netgear:r6900:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:mk60_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.5.102
cpe:2.3:h:netgear:mk60:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.5.102
cpe:2.3:h:netgear:mr60:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.5.102
cpe:2.3:h:netgear:ms60:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:* 1 OR 2.5.0.10
cpe:2.3:h:netgear:cbr40:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:* 1 OR 1.4.1.62
cpe:2.3:h:netgear:r8000p:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:* 1 OR 1.4.1.62
cpe:2.3:h:netgear:r7960p:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:* 1 OR 1.4.1.62
cpe:2.3:h:netgear:r7900p:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.64
cpe:2.3:h:netgear:rax15:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.64
cpe:2.3:h:netgear:rax20:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.3.102
cpe:2.3:h:netgear:rax75:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.3.102
cpe:2.3:h:netgear:rax80:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.2.102
cpe:2.3:h:netgear:rax200:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.2.64
cpe:2.3:h:netgear:rax45:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.2.64
cpe:2.3:h:netgear:rax50:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.0.68
cpe:2.3:h:netgear:ex7500:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.62
cpe:2.3:h:netgear:eax80:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.0.36
cpe:2.3:h:netgear:eax20:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk752:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk753_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk753:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk753s_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk753s:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk754_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk754:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbr750:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbs750:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk852:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk853_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk853:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk854_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk854:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbr850:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbs850:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbk842:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbr840:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:* 1 OR 3.2.16.6
cpe:2.3:h:netgear:rbs840:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.0.70
cpe:2.3:h:netgear:r6120:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.0.70
cpe:2.3:h:netgear:r6220:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.0.70
cpe:2.3:h:netgear:r6230:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:* 1 OR 1.1.0.76
cpe:2.3:h:netgear:r6260:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:* 1 OR 1.1.0.76
cpe:2.3:h:netgear:r6850:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:* 1 OR 1.1.0.76
cpe:2.3:h:netgear:r6350:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:* 1 OR 1.1.0.76
cpe:2.3:h:netgear:r6330:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.58
cpe:2.3:h:netgear:d7800:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.40
cpe:2.3:h:netgear:rbk50:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.40
cpe:2.3:h:netgear:rbr50:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.40
cpe:2.3:h:netgear:rbs50:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.36
cpe:2.3:h:netgear:rbk40:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.36
cpe:2.3:h:netgear:rbr40:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.38
cpe:2.3:h:netgear:rbs40:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk23_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.36
cpe:2.3:h:netgear:rbk23:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.38
cpe:2.3:h:netgear:rbr20:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.38
cpe:2.3:h:netgear:rbs20:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.44
cpe:2.3:h:netgear:rbk12:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk13_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.44
cpe:2.3:h:netgear:rbk13:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk14_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.44
cpe:2.3:h:netgear:rbk14:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbk15_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.44
cpe:2.3:h:netgear:rbk15:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.44
cpe:2.3:h:netgear:rbr10:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:* 1 OR 2.6.1.44
cpe:2.3:h:netgear:rbs10:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r6800:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r7200:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r7350:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r7400:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:r7450:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:ac2100:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:ac2400:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:* 1 OR 1.2.0.72
cpe:2.3:h:netgear:ac2600:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.2.74
cpe:2.3:h:netgear:r7800:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.5.24
cpe:2.3:h:netgear:r8900:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.5.24
cpe:2.3:h:netgear:r9000:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.136
cpe:2.3:h:netgear:rax120:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:* 1 OR 2.3.2.66
cpe:2.3:h:netgear:xr450:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:* 1 OR 2.3.2.66
cpe:2.3:h:netgear:xr500:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.1.34
cpe:2.3:h:netgear:xr700:*:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.3.50
cpe:2.3:h:netgear:xr300:*:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-05-10 07:18:26 Added to TrackCVE
2022-12-06 00:12:39 2021-03-23T07:15Z 2021-03-23T07:15:13 CVE Published Date updated
2022-12-06 00:12:39 2021-03-27T01:23:02 CVE Modified Date updated
2022-12-06 00:12:39 Analyzed Vulnerability Status updated