First published: Tue Apr 28 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.30, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, and WNDR4300 before 1.0.2.98.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D7800 Firmware | <1.0.1.30 | |
Netgear D7800 | ||
Netgear R6100 Firmware | <1.0.1.22 | |
Netgear R6100 | ||
Netgear R7500 Firmware | <1.0.3.24 | |
Netgear R7500 | =v2 | |
NETGEAR R7800 firmware | <1.0.2.40 | |
NETGEAR R7800 | ||
Netgear R9000 Firmware | <1.0.2.52 | |
NETGEAR R9000 | ||
Netgear Wndr4300 Firmware | <1.0.2.98 | |
Netgear Wndr4300 | ||
Netgear R7500 Firmware | <1.0.0.122 | |
Netgear R7500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
NETGEAR devices including D7800, R6100, R7500, R7500v2, R7800, R9000, and WNDR4300.
The severity of CVE-2018-21199 is medium with a CVSS score of 6.8.
It allows an authenticated user to execute a stack-based buffer overflow on certain NETGEAR devices.
Refer to the NETGEAR security advisory (PSV-2017-2593) for more information and steps to identify if your device is affected.
Yes, firmware updates are available for the affected NETGEAR devices to address this vulnerability. Refer to the NETGEAR security advisory (PSV-2017-2593) for the appropriate firmware versions.