First published: Fri Apr 24 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D6200B firmware | <1.1.00.24 | |
NETGEAR D6200 firmware | ||
Netgear R6700 Firmware | <1.1.0.42 | |
NETGEAR R6700v1 firmware | =v2 | |
NETGEAR R6800 firmware | <1.1.0.42 | |
NETGEAR R6800 firmware | ||
Netgear R6900 Firmware | <1.1.0.42 | |
Netgear R6900 Firmware | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-18727.
This vulnerability affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
No, this vulnerability can be exploited by an unauthenticated attacker.
The severity of CVE-2017-18727 is high with a CVSS score of 8.8.
To fix this vulnerability, you should update your NETGEAR device firmware to version 1.1.00.24 for D6200, 1.1.0.42 for R6700v2, R6800, and R6900v2.