First published: Tue Apr 28 2020(Updated: )
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D6100 before 1.0.0.56, and R6100 before 1.0.1.20.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6100 Firmware | <1.0.1.20 | |
Netgear R6100 | ||
Netgear D6000 Firmware | <1.0.0.67 | |
Netgear D6000 | ||
Netgear D3600 Firmware | <1.0.0.67 | |
NETGEAR D3600 | ||
Netgear D6100 Firmware | <1.0.0.56 | |
NETGEAR D6100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-21216.
Certain NETGEAR devices including D3600, D6000, D6100, and R6100 are affected.
The severity rating is 8.8 (High).
An unauthenticated attacker can exploit this vulnerability by sending a specially crafted buffer overflow attack.
Yes, Netgear has released firmware updates to address this vulnerability. Please refer to the Netgear security advisory for more information.