First published: Wed Aug 11 2021(Updated: )
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D3600 Firmware | <1.0.0.76 | |
NETGEAR D3600 | ||
Netgear D6000 Firmware | <1.0.0.76 | |
Netgear D6000 | ||
Netgear D6200 Firmware | <1.1.00.36 | |
Netgear D6200 | ||
Netgear D7000 Firmware | <1.0.1.70 | |
NETGEAR D7000 | ||
Netgear Ex6200 Firmware | <1.0.1.78 | |
Netgear EX6200 | =v2 | |
Netgear Ex7000 Firmware | <1.0.1.78 | |
NETGEAR EX7000 | ||
NETGEAR R7800 | <1.0.1.186 | |
Netgear Ex8000 | ||
Netgear Jr6150 Firmware | <1.0.1.18 | |
Netgear Jr6150 | ||
Netgear Pr2000 Firmware | <1.0.0.28 | |
Netgear Pr2000 | ||
Netgear R6020 Firmware | <1.0.0.42 | |
NETGEAR R6020 | ||
Netgear R6050 Firmware | <1.0.1.18 | |
Netgear R6050 | ||
Netgear R6080 Firmware | <1.0.0.42 | |
Netgear R6080 | ||
Netgear R6120 Firmware | <1.0.0.46 | |
NETGEAR R6120 | ||
Netgear R6220 Firmware | <1.1.0.80 | |
NETGEAR R6220 | ||
Netgear R6260 Firmware | <1.1.0.64 | |
NETGEAR R6260 | ||
Netgear R6300 Firmware | <1.0.4.34 | |
Netgear R6300 | =v2 | |
Netgear R6700 Firmware | <1.0.2.6 | |
NETGEAR R6700 | ||
Netgear R6700 Firmware | <1.2.0.36 | |
NETGEAR R6700 | =v2 | |
Netgear R6800 Firmware | <1.2.0.36 | |
Netgear R6800 | ||
Netgear R6900 Firmware | <1.0.2.4 | |
Netgear R6900 | ||
Netgear R6900p Firmware | <1.3.1.64 | |
Netgear R6900P | ||
Netgear R6900 Firmware | <1.2.0.36 | |
Netgear R6900 | =v2 | |
Netgear R7000 Firmware | <1.0.9.42 | |
NETGEAR R7000 | ||
Netgear R7000p Firmware | <1.3.1.64 | |
Netgear R7000P | ||
NETGEAR R7800 firmware | <1.0.2.60 | |
NETGEAR R7800 | ||
Netgear R8900 Firmware | <1.0.4.12 | |
NETGEAR R8900 | ||
Netgear R9000 Firmware | <1.0.4.12 | |
NETGEAR R9000 | ||
Netgear Xr500 Firmware | <2.3.2.40 | |
NETGEAR XR500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38525 is a vulnerability in certain NETGEAR devices that allows an authenticated user to perform a stack-based buffer overflow.
The following NETGEAR devices are affected by CVE-2021-38525: D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18.
CVE-2021-38525 has a severity value of 7.2, which is considered high.
To fix CVE-2021-38525, it is recommended to update the firmware of the affected NETGEAR devices to the latest version available.
More information about CVE-2021-38525 can be found at the following reference link: [https://kb.netgear.com/000063759/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0378](https://kb.netgear.com/000063759/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0378)