First published: Mon Apr 27 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R7500 before 1.0.0.122, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D6100 Firmware | <1.0.0.57 | |
NETGEAR D6100 | ||
Netgear R7500 Firmware | <1.0.0.122 | |
Netgear R7500 | ||
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
Netgear R9000 Firmware | <1.0.2.52 | |
NETGEAR R9000 | ||
Netgear Wndr3700 Firmware | <1.0.2.92 | |
Netgear WNDR3700 | =v4 | |
Netgear Wndr4300 Firmware | <1.0.2.94 | |
Netgear Wndr4300 | ||
Netgear Wndr4300 Firmware | <1.0.0.50 | |
Netgear Wndr4300 | =v2 | |
Netgear Wndr4500 Firmware | <1.0.0.50 | |
Netgear WNDR4500 | =v3 | |
Netgear Wnr2000 Firmware | <1.0.0.62 | |
Netgear WNR2000 | =v5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-21174.
The NETGEAR devices affected by this vulnerability include D6100, R7500, R7800, R9000, WNDR3700v4, WNDR4300, WNDR4300v2, and WNDR4500v3.
The severity of CVE-2018-21174 is high with a CVSS score of 7.2.
To fix the CVE-2018-21174 vulnerability, it is recommended to update the firmware of the affected NETGEAR devices to the latest available version.
You can find more information about CVE-2018-21174 in the Netgear security advisory: [Netgear Security Advisory](https://kb.netgear.com/000055184/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2625)