First published: Tue Apr 28 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.34, R6100 before 1.0.1.20, R7500 before 1.0.0.122, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.3.6, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D6100 firmware | <1.0.0.57 | |
NETGEAR D6100 firmware | ||
NETGEAR D7800 | <1.0.1.34 | |
NETGEAR D7800 Firmware | ||
NETGEAR R6100 firmware | <1.0.1.20 | |
NETGEAR R6100 firmware | ||
NETGEAR R7500v2 firmware | <1.0.0.122 | |
NETGEAR R7500v2 firmware | ||
NETGEAR R7500v2 firmware | <1.0.3.24 | |
NETGEAR R7500v2 firmware | =v2 | |
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
NETGEAR R9000 firmware | <1.0.3.6 | |
NETGEAR R9000 firmware | ||
NETGEAR WNDR3700 firmware | <1.0.2.92 | |
NETGEAR WNDR3700v4 | =v4 | |
NETGEAR WNDR4300v2 firmware | <1.0.2.94 | |
NETGEAR wndr4300v2 | ||
NETGEAR WNDR4300v2 firmware | <1.0.0.50 | |
NETGEAR wndr4300v2 | =v2 | |
NETGEAR WNDR4500 firmware | <1.0.0.50 | |
NETGEAR WNDR4500v3 | =v3 | |
NETGEAR WNR2000v2 | <1.0.0.62 | |
Netgear WNR2000v4 | =v5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
D6100, D7800, R6100, R7500, R7500v2, R7800, R9000, WNDR3700v4, WNDR4300, WNDR4500, and WNR2000.
The severity of CVE-2018-21194 is medium.
The authenticated user triggers the stack-based buffer overflow through a specific request to the affected NETGEAR device.
Apply the latest firmware update provided by NETGEAR to the affected device.
You can find more information about CVE-2018-21194 in the NETGEAR security advisory linked in the references.