First published: Mon Apr 27 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R7800 before 1.0.2.40, R9000 before 1.0.3.6, WNDR3700v4 before 1.0.2.92, and WNDR4300 before 1.0.2.98.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
NETGEAR R9000 firmware | <1.0.2.40 | |
NETGEAR R9000 firmware | ||
NETGEAR D6100 firmware | <1.0.0.57 | |
NETGEAR D6100 firmware | ||
NETGEAR WNDR3700 firmware | <1.0.2.92 | |
NETGEAR WNDR3700v4 | =v4 | |
NETGEAR WNDR4300v2 firmware | <1.0.2.98 | |
NETGEAR wndr4300v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this stack-based buffer overflow is CVE-2018-21171.
This vulnerability affects certain NETGEAR devices including D6100 before 1.0.0.57, R7800 before 1.0.2.40, R9000 before 1.0.3.6, WNDR3700v4 before 1.0.2.92, and WNDR4300 before 1.0.2.98.
CVE-2018-21171 has a severity level of 6.8 (medium).
This vulnerability occurs due to a stack-based buffer overflow caused by an authenticated user.
To fix the vulnerability in your NETGEAR device, you should update the firmware to the latest available version.