cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2016-11056,https://securityvulnerability.io/vulnerability/CVE-2016-11056,,Certain NETGEAR devices are affected by anonymous root access. This affects ReadyNAS Surveillance 1.1.1-3-armel and earlier and ReadyNAS Surveillance 1.4.1-3-amd64 and earlier.,Netgear,Readynas Surveillance,8.8,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2020-04-28T16:00:35.000Z,0 CVE-2017-18861,https://securityvulnerability.io/vulnerability/CVE-2017-18861,,Certain NETGEAR devices are affected by CSRF. This affects ReadyNAS Surveillance 1.4.3-15-x86 and earlier and ReadyNAS Surveillance 1.1.4-5-ARM and earlier.,Netgear,Readynas Surveillance,8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2020-04-28T15:53:13.000Z,0 CVE-2017-18378,https://securityvulnerability.io/vulnerability/CVE-2017-18378,,"In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.",Netgear,Readynas Surveillance Firmware,8.4,HIGH,0.03818000108003616,false,,false,false,false,,,false,false,,2019-06-11T20:44:55.000Z,0 CVE-2016-5675,https://securityvulnerability.io/vulnerability/CVE-2016-5675,,"handle_daylightsaving.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.0.0 through 3.0.0, NUUO Crystal 2.2.1 through 3.2.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the NTPServer parameter.",Netgear,Readynas Surveillance,9.8,CRITICAL,0.26980000734329224,false,,false,false,false,,,false,false,,2016-08-31T15:00:00.000Z,0 CVE-2016-5674,https://securityvulnerability.io/vulnerability/CVE-2016-5674,,"__debugging_center_utils___.php in NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.7.5 through 3.0.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to execute arbitrary PHP code via the log parameter.",Netgear,Readynas Surveillance,9.8,CRITICAL,0.9445300102233887,false,,false,false,false,,,false,false,,2016-08-31T15:00:00.000Z,0 CVE-2016-5676,https://securityvulnerability.io/vulnerability/CVE-2016-5676,,"cgi-bin/cgi_system in NUUO NVRmini 2 1.7.5 through 2.x, NUUO NVRsolo 1.7.5 through 2.x, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to reset the administrator password via a cmd=loaddefconfig action.",Netgear,Readynas Surveillance,7.5,HIGH,0.07767999917268753,false,,false,false,false,,,false,false,,2016-08-31T15:00:00.000Z,0 CVE-2016-5677,https://securityvulnerability.io/vulnerability/CVE-2016-5677,,"NUUO NVRmini 2 1.7.5 through 3.0.0, NUUO NVRsolo 1.0.0 through 3.0.0, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 have a hardcoded qwe23622260 password for the nuuoeng account, which allows remote attackers to obtain sensitive information via an __nvr_status___.php request.",Netgear,Readynas Surveillance,7.5,HIGH,0.0023900000378489494,false,,false,false,false,,,false,false,,2016-08-31T15:00:00.000Z,0