First published: Wed Sep 11 2019(Updated: )
An exploitable denial-of-service vulnerability exists in the Host Access Point Daemon (hostapd) on the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) wireless router. A SOAP request sent in an invalid sequence to the <WFAWLANConfig:1#PutMessage> service can cause a null pointer dereference, resulting in the hostapd service crashing. An unauthenticated attacker can send a specially-crafted SOAP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR WNR2000v2 | =1.0.0.70 | |
Netgear WNR2000v4 | =v5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5055 has a severity rating that indicates it can lead to a denial-of-service condition.
To fix CVE-2019-5055, users should update the firmware of the NETGEAR N300 (WNR2000v5) to the latest version.
The affected device for CVE-2019-5055 is the NETGEAR N300 (WNR2000v5) running firmware version V1.0.0.70.
CVE-2019-5055 facilitates a denial-of-service attack through improperly sequenced SOAP requests.
There are no documented workarounds for CVE-2019-5055, and upgrading the firmware is the recommended solution.