First published: Fri Apr 24 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6100 before 1.0.1.20, R7800 before 1.0.2.40, and R9000 before 1.0.2.52.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6100 firmware | <1.0.1.20 | |
NETGEAR R6100 firmware | ||
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 firmware | ||
NETGEAR R9000 firmware | <1.0.2.52 | |
NETGEAR R9000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18698 is considered a high severity vulnerability due to its potential for exploitation via a stack-based buffer overflow.
To fix CVE-2017-18698, update your NETGEAR device firmware to version R6100 1.0.1.20, R7800 1.0.2.40, or R9000 1.0.2.52 or later.
CVE-2017-18698 affects the NETGEAR R6100, R7800, and R9000 devices with specific firmware versions.
CVE-2017-18698 is a stack-based buffer overflow vulnerability that requires authentication to exploit.
CVE-2017-18698 cannot be exploited remotely as it requires an authenticated user to trigger the vulnerability.