First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects DGN2200v1 before 1.0.0.58, D8500 before 1.0.3.42, D7000v2 before 1.0.0.51, D6400 before 1.0.0.78, D6220 before 1.0.0.44, JNDR3000 before 1.0.0.24, R8000 before 1.0.4.18, R8500 before 1.0.2.122, R8300 before 1.0.2.122, R7900 before 1.0.2.16, R7000P before 1.3.2.34, R7300DST before 1.0.0.68, R7100LG before 1.0.0.46, R6900P before 1.3.2.34, R7000 before 1.0.9.28, R6900 before 1.0.1.46, R6700 before 1.0.1.46, R6400v2 before 1.0.2.56, R6400 before 1.0.1.42, R6300v2 before 1.0.4.28, R6250 before 1.0.4.26, WNDR3400v3 before 1.0.1.22, WNDR4500v2 before 1.0.0.72, and WNR3500Lv2 before 1.2.0.50.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR DGN2200B firmware | <1.0.0.58 | |
NETGEAR DGN2200M | =v1 | |
Netgear D8500 Firmware | <1.0.3.42 | |
Netgear D8500 Firmware | ||
NETGEAR D7000v1 firmware | <1.0.0.51 | |
NETGEAR D7000 firmware | =v2 | |
NETGEAR D6400 | <1.0.0.78 | |
NETGEAR D6400 firmware | ||
Netgear D6220 Firmware | <1.0.0.44 | |
NETGEAR D6220 firmware | ||
NETGEAR JNDR3000 | <1.0.0.24 | |
NETGEAR JNDR3000 firmware | ||
NETGEAR R8000 firmware | <1.0.4.18 | |
NETGEAR R8000 firmware | ||
NETGEAR R8500 | <1.0.2.122 | |
NETGEAR R8500 | ||
NETGEAR R8300 firmware | <1.0.2.122 | |
NETGEAR R8300 firmware | ||
NETGEAR R7900P firmware | <1.0.2.16 | |
NETGEAR R7900P firmware | ||
NETGEAR R7000P firmware | <1.3.2.34 | |
Netgear Routers | ||
NETGEAR R7300DST firmware | <1.0.0.68 | |
NETGEAR R7300DST firmware | ||
NETGEAR R7100LG firmware | <1.0.0.46 | |
Netgear R7100LG | ||
NETGEAR R6900P Firmware | <1.3.2.34 | |
Netgear R6900 Firmware | ||
NETGEAR Nighthawk R7000 | <1.0.9.28 | |
NETGEAR Nighthawk R7000 | ||
Netgear R6900 Firmware | <1.0.1.46 | |
Netgear R6900 Firmware | ||
NETGEAR R6700 firmware | <1.0.1.46 | |
NETGEAR R6700v1 firmware | ||
NETGEAR R6400 firmware | <1.0.2.56 | |
NETGEAR R6400 firmware | =v2 | |
NETGEAR R6400 firmware | <1.0.1.42 | |
NETGEAR R6400 firmware | ||
NETGEAR R6300 firmware | <1.0.4.28 | |
NETGEAR R6300 firmware | =v2 | |
Netgear R6250 Firmware | <1.0.4.26 | |
NETGEAR R6250 | ||
NETGEAR WNDR3400 | <1.0.1.22 | |
NETGEAR WNDR3400 firmware | =v3 | |
NETGEAR WNDR4500 firmware | <1.0.0.72 | |
NETGEAR WNDR4500v3 | =v2 | |
NETGEAR WNR3500L | <1.2.0.50 | |
NETGEAR WNR3500L firmware | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20753 is a vulnerability that allows an unauthenticated attacker to perform a stack-based buffer overflow on certain NETGEAR devices.
The following NETGEAR devices are affected by CVE-2019-20753: DGN2200v1, D8500, D7000v2, D6400, D6220, JNDR3000, R8000, R8500, R8300, R7900, R7000p, R7300dst, R7100lg, R6900p, R7000, R6900, R6700, R6400, R6300, R6250, Wndr3400, and Wndr4500.
CVE-2019-20753 has a severity rating of 8.8 (high).
To fix the CVE-2019-20753 vulnerability, you should update the firmware of the affected NETGEAR devices to the latest version provided by NETGEAR.
You can find more information about CVE-2019-20753 on the NETGEAR security advisory page: https://kb.netgear.com/000060629/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Modem-Routers-PSV-2018-0085