First published: Mon Apr 27 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects EX2700 before 1.0.1.28, R7800 before 1.0.2.40, WN2000RPTv3 before 1.0.1.20, WN3000RPv3 before 1.0.2.50, and WN3100RPv2 before 1.0.0.56.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
Netgear Ex2700 Firmware | <1.0.1.28 | |
Netgear Ex2700 | ||
Netgear Wn2000rpt Firmware | <1.0.1.20 | |
Netgear Wn2000rpt | =v3 | |
Netgear Wn3000rp Firmware | <1.0.2.50 | |
Netgear Wn3000rp | =v3 | |
Netgear Wn3100rp Firmware | <1.0.0.56 | |
Netgear Wn3100rp | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-21170.
The affected devices include EX2700, R7800, WN2000RPTv3, WN3000RPv3, and WN3100RPv2.
The severity rating of CVE-2018-21170 is high with a score of 8.8.
An unauthenticated attacker can exploit this vulnerability by triggering a stack-based buffer overflow.
To protect your NETGEAR device from CVE-2018-21170, make sure to update the firmware to the patched version provided by NETGEAR.