First published: Tue Nov 22 2022(Updated: )
Netgear R7000P V1.3.0.8, V1.3.1.64 is vulnerable to Buffer Overflow via parameters: stamode_dns1_pri and stamode_dns1_sec.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R7000p Firmware | =1.3.0.8 | |
Netgear R7000p Firmware | =1.3.1.64 | |
Netgear R7000P | ||
All of | ||
Any of | ||
Netgear R7000p Firmware | =1.3.0.8 | |
Netgear R7000p Firmware | =1.3.1.64 | |
Netgear R7000P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44200 is a vulnerability found in Netgear R7000P V1.3.0.8 and V1.3.1.64 firmware, which allows for buffer overflow via the parameters stamode_dns1_pri and stamode_dns1_sec.
The severity of CVE-2022-44200 is rated as critical with a CVSS score of 9.8.
Netgear R7000P firmware versions 1.3.0.8 and 1.3.1.64 are affected by CVE-2022-44200.
To fix CVE-2022-44200, Netgear users should update their R7000P firmware to a patched version provided by Netgear.
No, Netgear R7000P routers themselves are not vulnerable to CVE-2022-44200.