First published: Mon Feb 13 2023(Updated: )
NETGEAR Nighthawk WiFi Mesh systems and routers are affected by a stack-based buffer overflow vulnerability. This affects MR60 before 1.1.7.132, MS60 before 1.1.7.132, R6900P before 1.3.3.154, R7000P before 1.3.3.154, R7960P before 1.4.4.94, and R8000P before 1.4.4.94.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Mr60 Firmware | <1.1.7.132 | |
Netgear Mr60 | ||
Netgear Ms60 Firmware | <1.1.7.132 | |
Netgear Ms60 | ||
Netgear R6900p Firmware | <1.3.3.154 | |
Netgear R6900P | ||
Netgear R7000p Firmware | <1.3.3.154 | |
Netgear R7000P | ||
Netgear R7960p Firmware | <1.4.4.94 | |
Netgear R7960p | ||
Netgear R8000p Firmware | <1.4.4.94 | |
Netgear R8000p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48322 is a stack-based buffer overflow vulnerability affecting NETGEAR Nighthawk WiFi Mesh systems and routers.
CVE-2022-48322 affects MR60 before 1.1.7.132, MS60 before 1.1.7.132, R6900P before 1.3.3.154, R7000P before 1.3.3.154, R7960P before 1.4.4.94, and R8000P before 1.4.4.94.
CVE-2022-48322 has a severity rating of 9.8 (Critical).
To fix CVE-2022-48322, you should update your NETGEAR Nighthawk WiFi Mesh systems and routers to the recommended firmware versions: MR60 1.1.7.132, MS60 1.1.7.132, R6900P 1.3.3.154, R7000P 1.3.3.154, R7960P 1.4.4.94, and R8000P 1.4.4.94.
You can find more information about CVE-2022-48322 in the official NETGEAR Security Advisory: [link](https://kb.netgear.com/000065265/Security-Advisory-for-Pre-authentication-Buffer-Overflow-on-Multiple-Products-PSV-2022-0155).