First published: Tue Apr 21 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.54, and WNDR4500v3 before 1.0.0.54.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D7800 | <1.0.1.34 | |
NETGEAR D7800 Firmware | ||
NETGEAR R7500v2 firmware | <1.0.3.26 | |
NETGEAR R7500v2 firmware | =v2 | |
NETGEAR R7800 firmware | <1.0.2.42 | |
NETGEAR R7800 firmware | ||
NETGEAR R8900 firmware | <1.0.3.10 | |
NETGEAR R8900 | ||
NETGEAR R9000 firmware | <1.0.3.10 | |
NETGEAR R9000 firmware | ||
NETGEAR WNDR4300v2 firmware | <1.0.0.54 | |
NETGEAR wndr4300v2 | =v2 | |
NETGEAR WNDR4500 firmware | <1.0.0.54 | |
NETGEAR WNDR4500v3 | =v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-21147 has a high severity rating due to its potential to allow authenticated users to execute arbitrary code.
To fix CVE-2018-21147, update your NETGEAR device firmware to the latest version that addresses the vulnerability.
CVE-2018-21147 affects NETGEAR models D7800, R7500v2, R7800, R8900, R9000, WNDR4300v2, and WNDR4500v3 prior to their respective fixed firmware versions.
CVE-2018-21147 is categorized as a stack-based buffer overflow vulnerability.
No, CVE-2018-21147 requires authentication, meaning an attacker must have valid credentials to exploit the vulnerability.