First published: Tue Apr 28 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.28, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, and R9000 before 1.0.3.6.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D6100 Firmware | <1.0.0.57 | |
NETGEAR D6100 | ||
Netgear D7800 Firmware | <1.0.1.28 | |
Netgear D7800 | ||
Netgear R7500 Firmware | <1.0.3.24 | |
Netgear R7500 | =v2 | |
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
Netgear R9000 Firmware | <1.0.3.6 | |
NETGEAR R9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
D6100, D7800, R7500v2, R7800, and R9000 devices are affected.
The severity level of CVE-2018-21184 is medium.
An authenticated user can exploit CVE-2018-21184 through a stack-based buffer overflow.
The recommended firmware version for the affected NETGEAR devices is D6100 1.0.0.57, D7800 1.0.1.28, R7500v2 1.0.3.24, R7800 1.0.2.40, and R9000 1.0.3.6.
You can find more information about CVE-2018-21184 at the following link: https://kb.netgear.com/000055174/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2615