First published: Wed Aug 11 2021(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.32, RAX50 before 1.0.2.32, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, and RBS750 before 3.2.16.6.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Mk62 Firmware | <1.0.6.110 | |
Netgear Mk62 | ||
Netgear Mr60 Firmware | <1.0.6.110 | |
Netgear Mr60 | ||
Netgear Ms60 Firmware | <1.0.6.110 | |
Netgear Ms60 | ||
Netgear Rax15 Firmware | <1.0.2.82 | |
Netgear Rax15 | ||
Netgear Rax20 Firmware | <1.0.2.82 | |
Netgear Rax20 | ||
Netgear Rax200 Firmware | <1.0.3.106 | |
NETGEAR RAX200 | ||
Netgear Rax45 Firmware | <1.0.2.32 | |
Netgear Rax45 | ||
Netgear Rax50 Firmware | <1.0.2.32 | |
Netgear Rax50 | ||
Netgear Rax75 Firmware | <1.0.3.106 | |
Netgear Rax75 | ||
Netgear Rax80 Firmware | <1.0.3.106 | |
Netgear Rax80 | ||
Netgear Rbk752 Firmware | <3.2.16.6 | |
Netgear Rbk752 | ||
Netgear Rbr750 Firmware | <3.2.16.6 | |
Netgear Rbr750 | ||
Netgear Rbs750 Firmware | <3.2.16.6 | |
Netgear Rbs750 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected devices are MK62, MR60, MS60, RAX15, RAX20, RAX200, RAX45, RAX50, and RAX75.
The severity of CVE-2021-38524 is medium (4.9).
An authenticated user can exploit CVE-2021-38524 by triggering a stack-based buffer overflow.
To fix CVE-2021-38524, update the firmware of the affected NETGEAR devices to the patched versions provided by NETGEAR.
You can find more information about CVE-2021-38524 in the NETGEAR security advisory referenced at https://kb.netgear.com/000063779/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2020-0225.