cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-38955,https://securityvulnerability.io/vulnerability/CVE-2022-38955,Firmware Modification Vulnerability in Netgear WPN824EXT WiFi Range Extender,"A vulnerability has been identified in the Netgear WPN824EXT WiFi Range Extender allowing attackers to exploit firmware modifications. By conducting a Man-in-the-Middle (MITM) attack, the attacker can manipulate the user-uploaded firmware image, circumventing the CRC checks. This exploitation potentially enables the introduction of a backdoor, granting unauthorized access to the device, or can lead to a Denial of Service (DoS) condition, rendering the extender inoperable. Ensuring device security and firmware integrity is crucial to mitigating such vulnerabilities.",Netgear,WPn824ext Firmware,7.5,HIGH,0.0016700000269338489,false,,false,false,false,,,false,false,,2022-09-20T17:47:27.000Z,0 CVE-2022-38956,https://securityvulnerability.io/vulnerability/CVE-2022-38956,Firmware Downgrade Vulnerability on Netgear WiFi Range Extender,"A vulnerability has been identified in the Netgear WPN824EXT WiFi Range Extender that allows an attacker to exploit a firmware downgrade issue. This flaw can enable a man-in-the-middle (MITM) attack, where the attacker replaces a user-uploaded firmware with a previous, potentially vulnerable version. This issue affects devices running Firmware 1.1.1_1.1.9 and earlier, posing significant security risks for users relying on this equipment. It's crucial for users to remain vigilant and update their devices to mitigate potential exploitation.",Netgear,WPn824ext Firmware,5.3,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2022-09-20T17:46:22.000Z,0