First published: Fri Apr 24 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D6200 Firmware | <1.1.00.24 | |
Netgear D6200 | ||
Netgear R6700 Firmware | <1.1.0.42 | |
NETGEAR R6700 | =v2 | |
Netgear R6800 Firmware | <1.1.0.42 | |
Netgear R6800 | ||
Netgear R6900 Firmware | <1.1.0.42 | |
Netgear R6900 | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NETGEAR stack-based buffer overflow vulnerability is CVE-2017-18728.
The NETGEAR devices affected by this stack-based buffer overflow vulnerability are D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
The severity of the CVE-2017-18728 vulnerability is high with a CVSS score of 8.8.
To fix the CVE-2017-18728 vulnerability, it is recommended to update the firmware of the affected NETGEAR devices to versions higher than 1.1.00.24 for D6200, 1.1.0.42 for R6700v2, R6800, and R6900v2.
You can find more information about the CVE-2017-18728 vulnerability in the Netgear security advisory at the following link: https://kb.netgear.com/000051527/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2136