### [CVE-2017-6862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6862) ![](https://img.shields.io/static/v1?label=Product&message=NETGEAR%20All%20versions%20prior%20to%20WNR2000v3%201.1.2.14%2C%20WNR2000v4%201.0.0.66%2C%20WNR2000v5%201.0.0.42&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Unauthenticated%20Remote%20Code%20Execution&color=brighgreen) ### Description NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261. ### POC #### Reference - https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261 #### Github - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors