Browse all 3 CVE security advisories affecting Netcomm. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Netcomm develops networking hardware and software solutions for enterprise and consumer markets, focusing on routers, modems, and communication systems. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and default credentials. The company has addressed multiple CVEs, including critical flaws that could allow unauthorized access or device compromise. While no major public security incidents have been widely reported, the consistent appearance of similar vulnerability classes suggests ongoing challenges in secure development practices. Netcomm's products remain targets for exploitation due to their widespread deployment in critical infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-4010 | Arbitrary Command Injection in Netcom NTC-6200 & NWL-222 — NTC 6200CWE-77 | 8.8AI | HighAI | 2025-06-02 |
| CVE-2022-4873 | Stack based overflow on Netcomm router models NF20MESH, NF20, and NL1902 — NF20 | 9.1 | - | 2023-01-11 |
| CVE-2022-4874 | Authenticated bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows unauthenticated user to get access to content. — NF20 | 7.5 | - | 2023-01-11 |
This page lists every published CVE security advisory associated with Netcomm. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.