First published: Mon Apr 27 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R7800 before 1.0.2.40, R9000 before 1.0.3.6, WNDR3700v4 before 1.0.2.92, and WNDR4300 before 1.0.2.98.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
Netgear R9000 Firmware | <1.0.2.40 | |
NETGEAR R9000 | ||
Netgear D6100 Firmware | <1.0.0.57 | |
NETGEAR D6100 | ||
Netgear Wndr3700 Firmware | <1.0.2.92 | |
Netgear WNDR3700 | =v4 | |
Netgear Wndr4300 Firmware | <1.0.2.98 | |
Netgear Wndr4300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this stack-based buffer overflow is CVE-2018-21171.
This vulnerability affects certain NETGEAR devices including D6100 before 1.0.0.57, R7800 before 1.0.2.40, R9000 before 1.0.3.6, WNDR3700v4 before 1.0.2.92, and WNDR4300 before 1.0.2.98.
CVE-2018-21171 has a severity level of 6.8 (medium).
This vulnerability occurs due to a stack-based buffer overflow caused by an authenticated user.
To fix the vulnerability in your NETGEAR device, you should update the firmware to the latest available version.