First published: Tue Nov 22 2022(Updated: )
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_pri.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R7000p Firmware | =1.3.1.64 | |
Netgear R7000P | ||
All of | ||
Netgear R7000p Firmware | =1.3.1.64 | |
Netgear R7000P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44186 is a vulnerability found in Netgear R7000P V1.3.1.64 firmware, where a buffer overflow can be triggered via the parameter wan_dns1_pri in /usr/sbin/httpd.
CVE-2022-44186 has a severity rating of 9.8 (Critical).
The affected software is Netgear R7000P V1.3.1.64 firmware.
To fix CVE-2022-44186, users should update their Netgear R7000P firmware to a version that has patched the vulnerability.
More information about CVE-2022-44186 can be found on the GitHub repository and the official Netgear security page.