First published: Fri Apr 24 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D6200B firmware | <1.1.00.24 | |
NETGEAR D6200 firmware | ||
Netgear R6700 Firmware | <1.1.0.42 | |
NETGEAR R6700v1 firmware | =v2 | |
NETGEAR R6800 firmware | <1.1.0.42 | |
NETGEAR R6800 firmware | ||
Netgear R6900 Firmware | <1.1.0.42 | |
Netgear R6900 Firmware | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NETGEAR vulnerability is CVE-2017-18724.
The NETGEAR devices affected by this vulnerability are D6200, R6700v2, R6800, and R6900v2.
The severity of CVE-2017-18724 is high with a CVSS score of 8.8.
An unauthenticated attacker can exploit this vulnerability by performing a stack-based buffer overflow attack.
To fix this vulnerability, you need to update your NETGEAR device to the latest firmware version specified in the security advisory.