First published: Thu Apr 16 2020(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects DGN2200v1 before 1.0.0.58, D8500 before 1.0.3.42, D7000v2 before 1.0.0.51, D6400 before 1.0.0.78, D6220 before 1.0.0.44, JNDR3000 before 1.0.0.24, R8000 before 1.0.4.18, R8500 before 1.0.2.122, R8300 before 1.0.2.122, R7900 before 1.0.2.16, R7000P before 1.3.2.34, R7300DST before 1.0.0.68, R7100LG before 1.0.0.46, R6900P before 1.3.2.34, R7000 before 1.0.9.28, R6900 before 1.0.1.46, R6700 before 1.0.1.46, R6400v2 before 1.0.2.56, R6400 before 1.0.1.42, R6300v2 before 1.0.4.28, R6250 before 1.0.4.26, WNDR3400v3 before 1.0.1.22, WNDR4500v2 before 1.0.0.72, and WNR3500Lv2 before 1.2.0.50.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Dgn2200 Firmware | <1.0.0.58 | |
Netgear DGN2200 | =v1 | |
Netgear D8500 Firmware | <1.0.3.42 | |
Netgear D8500 | ||
Netgear D7000 Firmware | <1.0.0.51 | |
NETGEAR D7000 | =v2 | |
NETGEAR R6400v2 | <1.0.0.78 | |
Netgear D6400 | ||
Netgear D6220 Firmware | <1.0.0.44 | |
NETGEAR D6220 | ||
Netgear Jndr3000 Firmware | <1.0.0.24 | |
Netgear Jndr3000 | ||
Netgear R8000 Firmware | <1.0.4.18 | |
NETGEAR R8000 | ||
Netgear R8500 Firmware | <1.0.2.122 | |
NETGEAR R8500 | ||
Netgear R8300 Firmware | <1.0.2.122 | |
NETGEAR R8300 | ||
Netgear R7900 Firmware | <1.0.2.16 | |
Netgear R7900 | ||
Netgear R7000p Firmware | <1.3.2.34 | |
Netgear R7000P | ||
Netgear R7300dst Firmware | <1.0.0.68 | |
Netgear R7300dst | ||
Netgear R7100lg Firmware | <1.0.0.46 | |
Netgear R7100LG | ||
Netgear R6900p Firmware | <1.3.2.34 | |
Netgear R6900P | ||
Netgear R7000 Firmware | <1.0.9.28 | |
NETGEAR R7000 | ||
Netgear R6900 Firmware | <1.0.1.46 | |
Netgear R6900 | ||
Netgear R6700 Firmware | <1.0.1.46 | |
NETGEAR R6700 | ||
Netgear R6400 Firmware | <1.0.2.56 | |
NETGEAR R6400 | =v2 | |
Netgear R6400 Firmware | <1.0.1.42 | |
NETGEAR R6400 | ||
Netgear R6300 Firmware | <1.0.4.28 | |
Netgear R6300 | =v2 | |
netgear R6250 Firmware | <1.0.4.26 | |
NETGEAR R6250 | ||
Netgear Wndr3400 Firmware | <1.0.1.22 | |
NETGEAR Multiple Routers | =v3 | |
Netgear Wndr4500 Firmware | <1.0.0.72 | |
Netgear WNDR4500 | =v2 | |
Netgear Wnr3500l Firmware | <1.2.0.50 | |
Netgear Wnr3500l | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20753 is a vulnerability that allows an unauthenticated attacker to perform a stack-based buffer overflow on certain NETGEAR devices.
The following NETGEAR devices are affected by CVE-2019-20753: DGN2200v1, D8500, D7000v2, D6400, D6220, JNDR3000, R8000, R8500, R8300, R7900, R7000p, R7300dst, R7100lg, R6900p, R7000, R6900, R6700, R6400, R6300, R6250, Wndr3400, and Wndr4500.
CVE-2019-20753 has a severity rating of 8.8 (high).
To fix the CVE-2019-20753 vulnerability, you should update the firmware of the affected NETGEAR devices to the latest version provided by NETGEAR.
You can find more information about CVE-2019-20753 on the NETGEAR security advisory page: https://kb.netgear.com/000060629/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Modem-Routers-PSV-2018-0085