cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-20486,https://securityvulnerability.io/vulnerability/CVE-2019-20486,,"An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple pages (setup.cgi and adv_index.htm) within the web management console are vulnerable to stored XSS, as demonstrated by the configuration of the UI language.",Netgear,Wnr1000 Firmware,6.1,MEDIUM,0.0018500000005587935,false,,false,false,false,,,false,false,,2020-03-02T15:06:33.000Z,0 CVE-2019-20488,https://securityvulnerability.io/vulnerability/CVE-2019-20488,,"An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the web management interface (setup.cgi) are vulnerable to command injection, allowing remote attackers to execute arbitrary commands, as demonstrated by shell metacharacters in the sysDNSHost parameter.",Netgear,Wnr1000 Firmware,9.8,CRITICAL,0.011119999922811985,false,,false,false,false,,,false,false,,2020-03-02T15:06:24.000Z,0 CVE-2019-20489,https://securityvulnerability.io/vulnerability/CVE-2019-20489,,"An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie.",Netgear,Wnr1000 Firmware,9.8,CRITICAL,0.0029200001154094934,false,,false,false,false,,,false,false,,2020-03-02T15:06:16.000Z,0 CVE-2019-20487,https://securityvulnerability.io/vulnerability/CVE-2019-20487,,"An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. Multiple actions within the WNR1000V4 web management console are vulnerable to an unauthenticated GET request (exploitable directly or through CSRF), as demonstrated by the setup.cgi?todo=save_htp_account URI.",Netgear,Wnr1000 Firmware,8.8,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2020-03-02T15:06:06.000Z,0 CVE-2013-3317,https://securityvulnerability.io/vulnerability/CVE-2013-3317,,Netgear WNR1000v3 with firmware before 1.0.2.60 contains an Authentication Bypass via the NtgrBak key.,Netgear,Wnr1000 Firmware,9.8,CRITICAL,0.03466000035405159,false,,false,false,false,,,false,false,,2020-01-29T21:18:35.000Z,0 CVE-2013-3316,https://securityvulnerability.io/vulnerability/CVE-2013-3316,,"Netgear WNR1000v3 with firmware before 1.0.2.60 contains an Authentication Bypass due to the server skipping checks for URLs containing a "".jpg"".",Netgear,Wnr1000 Firmware,9.8,CRITICAL,0.03466000035405159,false,,false,false,false,,,false,false,,2020-01-29T21:15:44.000Z,0