First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, R7300 before 1.0.0.70, R8300 before 1.0.2.130, and R8500 before 1.0.2.130.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Dgn2200 Firmware | <1.0.0.110 | |
Netgear DGN2200 | =v4 | |
Netgear Dgnd2200b Firmware | <1.0.0.109 | |
Netgear Dgnd2200b | =v4 | |
Netgear R7300 Firmware | <1.0.0.70 | |
Netgear R7300 | ||
Netgear R8300 Firmware | <1.0.2.130 | |
NETGEAR R8300 | ||
Netgear R8500 Firmware | <1.0.2.130 | |
NETGEAR R8500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
DGN2200v4, DGND2200Bv4, R7300, R8300, and R8500 are affected by CVE-2019-20740.
The severity level of CVE-2019-20740 is medium with a rating of 6.8.
An authenticated user can exploit the stack-based buffer overflow vulnerability in CVE-2019-20740.
Ensure that you have installed the latest firmware version for the affected NETGEAR devices.
You can find more information about CVE-2019-20740 in the Netgear security advisory: [https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258](https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258).