First published: Fri Apr 24 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6020 before 1.0.0.30, R6080 before 1.0.0.30, R6120 before 1.0.0.36, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D6200 Firmware | <1.1.00.24 | |
Netgear D6200 | ||
Netgear R6020 Firmware | <1.0.0.30 | |
NETGEAR R6020 | ||
Netgear R6080 Firmware | <1.0.0.30 | |
Netgear R6080 | ||
Netgear R6120 Firmware | <1.0.0.36 | |
NETGEAR R6120 | ||
Netgear R6700 Firmware | <1.1.0.42 | |
NETGEAR R6700 | =v2 | |
Netgear R6800 Firmware | <1.1.0.42 | |
Netgear R6800 | ||
Netgear R6900 Firmware | <1.1.0.42 | |
Netgear R6900 | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18729 is a vulnerability that affects certain NETGEAR devices and allows an unauthenticated attacker to perform a stack-based buffer overflow.
CVE-2017-18729 affects D6200 before 1.1.00.24, R6020 before 1.0.0.30, R6080 before 1.0.0.30, R6120 before 1.0.0.36, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
CVE-2017-18729 has a severity rating of 8.8, which is classified as high.
An attacker can exploit CVE-2017-18729 by sending a specially crafted request to the affected NETGEAR device, causing a stack-based buffer overflow and potentially executing arbitrary code.
To fix CVE-2017-18729, update the firmware of the affected NETGEAR device to a version that is not vulnerable.