First published: Tue Apr 28 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, and WNDR4300 before 1.0.2.94.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
Netgear R9000 Firmware | <1.0.2.52 | |
NETGEAR R9000 | ||
Netgear Wndr3700 Firmware | <1.0.2.92 | |
Netgear WNDR3700 | =v4 | |
Netgear Wndr4300 Firmware | <1.0.2.94 | |
Netgear Wndr4300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-21182 is a vulnerability that affects certain NETGEAR devices, allowing an authenticated user to perform a stack-based buffer overflow.
NETGEAR R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, and WNDR4300 before 1.0.2.94 are affected by CVE-2018-21182.
The severity of CVE-2018-21182 is medium with a CVSS score of 6.8.
To fix CVE-2018-21182, you need to update the firmware of your affected NETGEAR device to version 1.0.2.40 for R7800, 1.0.2.52 for R9000, 1.0.2.92 for WNDR3700v4, or 1.0.2.94 for WNDR4300.
You can find more information about CVE-2018-21182 in the security advisory on the NETGEAR website: https://kb.netgear.com/000055176/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2017-2617