First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBS40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, and RBS50 before 2.3.0.32.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D7800 | <1.0.1.44 | |
NETGEAR D7800 Firmware | ||
NETGEAR R7500v2 firmware | <1.0.3.38 | |
NETGEAR R7500v2 firmware | =v2 | |
NETGEAR R7800 firmware | <1.0.2.52 | |
NETGEAR R7800 firmware | ||
NETGEAR RBK20 Router Firmware | <2.3.0.28 | |
NETGEAR Orbi RBK20 | ||
NETGEAR RBR20 | <2.3.0.28 | |
NETGEAR RBR20 | ||
NETGEAR RBS20 | <2.3.0.28 | |
NETGEAR RBS20 firmware | ||
NETGEAR RBK40 Satellite Firmware | <2.3.0.28 | |
NETGEAR RBK40 firmware | ||
NETGEAR RBS40 Firmware | <2.3.0.28 | |
NETGEAR RBS40 firmware | ||
NETGEAR RBK50 firmware | <2.3.0.32 | |
NETGEAR Orbi RBK50 | ||
NETGEAR RBR50 firmware | <2.3.0.32 | |
NETGEAR RBR50 firmware | ||
NETGEAR RBS50 Firmware | <2.3.0.32 | |
NETGEAR RBS50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBS40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32.
The severity of CVE-2019-20748 is medium (6.8).
The CWE ID for CVE-2019-20748 is CWE-119, CWE-787.
You can find more information about CVE-2019-20748 in the Netgear Security Advisory: https://kb.netgear.com/000060963/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0147.
To fix CVE-2019-20748, update the firmware of the affected NETGEAR devices to the latest version available.