First published: Wed Apr 22 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700 firmware | <1.1.0.42 | |
NETGEAR R6700v1 firmware | =v2 | |
NETGEAR R6800 firmware | <1.1.0.42 | |
NETGEAR R6800 firmware | ||
Netgear R6900 Firmware | <1.1.0.42 | |
Netgear R6900 Firmware | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18758 is considered a critical vulnerability due to its potential for exploitation through a stack-based buffer overflow.
CVE-2017-18758 affects NETGEAR R6700v2, R6800, and R6900v2 devices running firmware versions prior to 1.1.0.42.
To fix CVE-2017-18758, you should update your affected NETGEAR device firmware to version 1.1.0.42 or later.
CVE-2017-18758 is a stack-based buffer overflow vulnerability that can be exploited by an authenticated user.
CVE-2017-18758 requires authentication for exploitation, which means it cannot be exploited remotely without access to the device.