First published: Tue Apr 28 2020(Updated: )
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D6100 before 1.0.0.56, and R6100 before 1.0.1.20.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6100 firmware | <1.0.1.20 | |
NETGEAR R6100 firmware | ||
NETGEAR D6000 firmware | <1.0.0.67 | |
NETGEAR D6000 firmware | ||
NETGEAR D3600 firmware | <1.0.0.67 | |
NETGEAR D3600 firmware | ||
NETGEAR D6100 firmware | <1.0.0.56 | |
NETGEAR D6100 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-21216.
Certain NETGEAR devices including D3600, D6000, D6100, and R6100 are affected.
The severity rating is 8.8 (High).
An unauthenticated attacker can exploit this vulnerability by sending a specially crafted buffer overflow attack.
Yes, Netgear has released firmware updates to address this vulnerability. Please refer to the Netgear security advisory for more information.