First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBS40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, and RBS50 before 2.3.0.32.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D7800 Firmware | <1.0.1.44 | |
Netgear D7800 | ||
Netgear R7500 Firmware | <1.0.3.38 | |
Netgear R7500 | =v2 | |
NETGEAR R7800 firmware | <1.0.2.52 | |
NETGEAR R7800 | ||
Netgear Rbk20 Firmware | <2.3.0.28 | |
Netgear Rbk20 | ||
Netgear Rbr20 Firmware | <2.3.0.28 | |
Netgear Rbr20 | ||
Netgear Rbs20 Firmware | <2.3.0.28 | |
Netgear Rbs20 | ||
Netgear Rbk40 Firmware | <2.3.0.28 | |
Netgear Rbk40 | ||
Netgear Rbs40 Firmware | <2.3.0.28 | |
Netgear Rbs40 | ||
Netgear Rbk50 Firmware | <2.3.0.32 | |
Netgear Rbk50 | ||
Netgear Rbr50 Firmware | <2.3.0.32 | |
Netgear Rbr50 | ||
Netgear Rbs50 Firmware | <2.3.0.32 | |
Netgear Rbs50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBS40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32.
The severity of CVE-2019-20748 is medium (6.8).
The CWE ID for CVE-2019-20748 is CWE-119, CWE-787.
You can find more information about CVE-2019-20748 in the Netgear Security Advisory: https://kb.netgear.com/000060963/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0147.
To fix CVE-2019-20748, update the firmware of the affected NETGEAR devices to the latest version available.