Known Vulnerabilities for Dgn2200 Firmware by Netgear

Listed below are 10 of the newest known vulnerabilities associated with "Dgn2200 Firmware" by "Netgear".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-38534 Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6100 before 1... 4.8 - MEDIUM 2021-08-11 2021-08-19
CVE-2021-38516 Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6220 before 1.0.0.48, D64... 9.8 - CRITICAL 2021-08-11 2022-07-12
CVE-2021-38514 Certain NETGEAR devices are affected by authentication bypass. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D61... 2.7 - LOW 2021-08-11 2022-07-12
CVE-2020-35785 NETGEAR DGN2200v1 devices before v1.0.0.60 mishandle HTTPd authentication (aka PSV-2020-0363, PSV-2020-0364, and PSV-2020-036... 8.8 - HIGH 2020-12-30 2020-12-31
CVE-2019-20728 Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6400 before 1.0.0.74, D7000... 6.7 - MEDIUM 2020-04-16 2020-04-22
CVE-2019-20716 Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects DGN2200v4 ... 6.8 - MEDIUM 2020-04-16 2020-04-22
CVE-2019-20712 Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.52, D6400... 6.8 - MEDIUM 2020-04-16 2020-04-23
CVE-2019-20700 Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6220 befo... 6.7 - MEDIUM 2020-04-16 2020-04-23
CVE-2019-20692 Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6220 befo... 6.7 - MEDIUM 2020-04-16 2020-04-23
CVE-2019-17373 Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such a... 9.8 - CRITICAL 2019-10-09 2020-08-24

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
NetgearDgn2200 Firmware2017-01-06AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.96AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.94AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.86AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.82AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.60AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.58AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.55AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.50_7.0.50AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.110AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.106AllAllAll
Operating
System
NetgearDgn2200 Firmware1.0.0.102AllAllAll
Operating
System
NetgearDgn2200 Firmware-AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report