First published: Mon Jan 30 2023(Updated: )
Netgear routers R7000P before v1.3.3.154, R6900P before v1.3.3.154, R7960P before v1.4.4.94, and R8000P before v1.4.4.94 were discovered to contain a pre-authentication stack overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R7000p Firmware | <1.3.3.154 | |
Netgear R7000P | ||
Netgear R6900p Firmware | <1.3.3.154 | |
Netgear R6900P | ||
Netgear R7960p Firmware | <1.4.4.94 | |
Netgear R7960p | ||
Netgear R8000p Firmware | <1.4.4.94 | |
Netgear R8000p | ||
Netgear Mr60 Firmware | <1.1.7.132 | |
Netgear Mr60 | ||
Netgear Ms60 Firmware | <1.1.7.132 | |
Netgear Ms60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48176 is a vulnerability affecting Netgear routers R7000P, R6900P, R7960P, and R8000P before specific firmware versions, which allows pre-authentication stack overflow.
The Netgear router models R7000P, R6900P, R7960P, and R8000P are affected by CVE-2022-48176.
CVE-2022-48176 has a severity rating of 7.8 (high).
To fix the vulnerability CVE-2022-48176, Netgear recommends updating the firmware of the affected routers to version 1.3.3.154 (for R7000P and R6900P) or version 1.4.4.94 (for R7960P and R8000P).
You can find more information about CVE-2022-48176 on the HDWsec blog, Netgear's security advisory, and the Netgear website.