First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, R7300 before 1.0.0.70, R8300 before 1.0.2.130, and R8500 before 1.0.2.130.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR DGN2200B firmware | <1.0.0.110 | |
NETGEAR DGN2200M | =v4 | |
NETGEAR DGND2200B | <1.0.0.109 | |
NETGEAR DGND2200B firmware | =v4 | |
NETGEAR R7300 firmware | <1.0.0.70 | |
NETGEAR R7300 firmware | ||
NETGEAR R8300 firmware | <1.0.2.130 | |
NETGEAR R8300 firmware | ||
NETGEAR R8500 | <1.0.2.130 | |
NETGEAR R8500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
DGN2200v4, DGND2200Bv4, R7300, R8300, and R8500 are affected by CVE-2019-20740.
The severity level of CVE-2019-20740 is medium with a rating of 6.8.
An authenticated user can exploit the stack-based buffer overflow vulnerability in CVE-2019-20740.
Ensure that you have installed the latest firmware version for the affected NETGEAR devices.
You can find more information about CVE-2019-20740 in the Netgear security advisory: [https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258](https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258).