First published: Mon Nov 09 2020(Updated: )
upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6400v2 Firmware | =1.0.4.102_10.0.75 | |
NETGEAR R6400v2 | ||
Netgear R6400 Firmware | =1.0.1.62_1.0.41 | |
NETGEAR R6400 | ||
Netgear R7000p Firmware | =1.3.2.126_10.1.66 | |
Netgear R7000P | ||
Netgear Xr300 Firmware | =1.0.3.50_10.3.36 | |
Netgear XR300 | ||
Netgear R8000 Firmware | =1.0.4.62 | |
NETGEAR R8000 | ||
Netgear R8300 Firmware | =1.0.2.136 | |
NETGEAR R8300 | ||
Netgear R8500 Firmware | =1.0.2.136 | |
NETGEAR R8500 | ||
Netgear R7300dst Firmware | =1.0.0.74 | |
Netgear R7300dst | ||
Netgear R7850 Firmware | =1.0.5.64 | |
NETGEAR R6400v2 | ||
Netgear R7900 Firmware | =1.0.4.30 | |
Netgear R7900 | ||
Netgear Rax20 Firmware | =1.0.2.64 | |
Netgear Rax20 | ||
Netgear Rax80 Firmware | =1.0.3.102 | |
Netgear Rax80 | ||
netgear R6250 Firmware | =1.0.4.44 | |
NETGEAR R6250 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28373 is a vulnerability that allows remote attackers to execute arbitrary code on certain NETGEAR devices via a stack-based buffer overflow.
CVE-2020-28373 affects the following NETGEAR devices: R6400v2, R6400, R7000P, XR300, R8000, R8300, R8500, and R7300D.
CVE-2020-28373 has a severity rating of 8.8 (High).
Remote (LAN) attackers can exploit CVE-2020-28373 by leveraging a stack-based buffer overflow vulnerability in the upnpd service on vulnerable NETGEAR devices.
At present, there is no official fix available for CVE-2020-28373. It is recommended to disable the upnpd service on affected NETGEAR devices or implement network-level mitigations.