Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 22 Apr 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netgear r8500
|
|
| CPEs | cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Netgear r8500
|
Tue, 05 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netgear
Netgear r8500 Firmware |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:* | |
| Vendors & Products |
Netgear
Netgear r8500 Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 05 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component ipv6_fix.cgi via the ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, and ipv6_lan_length parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-05T16:17:19.207Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-50994
Updated: 2024-11-05T16:16:56.964Z
Status : Analyzed
Published: 2024-11-05T15:15:23.533
Modified: 2025-04-22T18:11:27.543
Link: CVE-2024-50994
No data.
OpenCVE Enrichment
No data.