First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6000 before 1.0.0.72, D6100 before 1.0.0.63, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D6000 firmware | <1.0.0.72 | |
NETGEAR D6000 firmware | ||
NETGEAR D6100 firmware | <1.0.0.63 | |
NETGEAR D6100 firmware | ||
NETGEAR R7800 firmware | <1.0.2.52 | |
NETGEAR R7800 firmware | ||
NETGEAR R8900 firmware | <1.0.4.2 | |
NETGEAR R8900 | ||
NETGEAR R9000 firmware | <1.0.4.2 | |
NETGEAR R9000 firmware | ||
NETGEAR WNDR3700 firmware | <1.0.2.102 | |
NETGEAR WNDR3700v4 | =v4 | |
NETGEAR WNDR4300v2 firmware | <1.0.2.104 | |
NETGEAR wndr4300v2 | =v1 | |
NETGEAR WNDR4300v2 firmware | <1.0.0.58 | |
NETGEAR wndr4300v2 | =v2 | |
NETGEAR WNDR4500 firmware | <1.0.0.58 | |
NETGEAR WNDR4500v3 | =v3 | |
NETGEAR WNR2000v2 | <1.0.0.68 | |
Netgear WNR2000v4 | =v5 | |
NETGEAR XR500 firmware | <2.3.2.32 | |
NETGEAR XR500 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
D6000, D6100, R7800, R8900, R9000, WNDR3700v4, WNDR4300v1, WNDR4300v2.
The severity of CVE-2019-20736 is medium, with a CVSS score of 6.8.
An authenticated user can exploit CVE-2019-20736 through a stack-based buffer overflow vulnerability.
No, the Netgear D6000 is not vulnerable to CVE-2019-20736.
You can find more information about CVE-2019-20736 on the Netgear Security Advisory page.