7.2
CWE
787 119
Advisory Published
Updated

CVE-2021-38525: Buffer Overflow

First published: Wed Aug 11 2021(Updated: )

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Netgear D3600 Firmware<1.0.0.76
NETGEAR D3600
Netgear D6000 Firmware<1.0.0.76
Netgear D6000
Netgear D6200 Firmware<1.1.00.36
Netgear D6200
Netgear D7000 Firmware<1.0.1.70
NETGEAR D7000
Netgear Ex6200 Firmware<1.0.1.78
Netgear EX6200=v2
Netgear Ex7000 Firmware<1.0.1.78
NETGEAR EX7000
NETGEAR R7800<1.0.1.186
Netgear Ex8000
Netgear Jr6150 Firmware<1.0.1.18
Netgear Jr6150
Netgear Pr2000 Firmware<1.0.0.28
Netgear Pr2000
Netgear R6020 Firmware<1.0.0.42
NETGEAR R6020
Netgear R6050 Firmware<1.0.1.18
Netgear R6050
Netgear R6080 Firmware<1.0.0.42
Netgear R6080
Netgear R6120 Firmware<1.0.0.46
NETGEAR R6120
Netgear R6220 Firmware<1.1.0.80
NETGEAR R6220
Netgear R6260 Firmware<1.1.0.64
NETGEAR R6260
Netgear R6300 Firmware<1.0.4.34
Netgear R6300=v2
Netgear R6700 Firmware<1.0.2.6
NETGEAR R6700
Netgear R6700 Firmware<1.2.0.36
NETGEAR R6700=v2
Netgear R6800 Firmware<1.2.0.36
Netgear R6800
Netgear R6900 Firmware<1.0.2.4
Netgear R6900
Netgear R6900p Firmware<1.3.1.64
Netgear R6900P
Netgear R6900 Firmware<1.2.0.36
Netgear R6900=v2
Netgear R7000 Firmware<1.0.9.42
NETGEAR R7000
Netgear R7000p Firmware<1.3.1.64
Netgear R7000P
NETGEAR R7800 firmware<1.0.2.60
NETGEAR R7800
Netgear R8900 Firmware<1.0.4.12
NETGEAR R8900
Netgear R9000 Firmware<1.0.4.12
NETGEAR R9000
Netgear Xr500 Firmware<2.3.2.40
NETGEAR XR500

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-38525?

    CVE-2021-38525 is a vulnerability in certain NETGEAR devices that allows an authenticated user to perform a stack-based buffer overflow.

  • Which devices are affected by CVE-2021-38525?

    The following NETGEAR devices are affected by CVE-2021-38525: D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18.

  • What is the severity of CVE-2021-38525?

    CVE-2021-38525 has a severity value of 7.2, which is considered high.

  • How can I fix CVE-2021-38525?

    To fix CVE-2021-38525, it is recommended to update the firmware of the affected NETGEAR devices to the latest version available.

  • Where can I find more information about CVE-2021-38525?

    More information about CVE-2021-38525 can be found at the following reference link: [https://kb.netgear.com/000063759/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0378](https://kb.netgear.com/000063759/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0378)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203