First published: Mon Aug 07 2023(Updated: )
Netgear DC112A 1.0.0.64, EX6200 1.0.3.94 and R6300v2 1.0.4.8 were discovered to contain a buffer overflow via the http_passwd parameter in password.cgi.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Dc112a Firmware | =1.0.0.64 | |
Netgear DC112A | ||
Netgear Ex6200 Firmware | =1.0.3.94 | |
Netgear EX6200 | ||
Netgear R6300v2 Firmware | =1.0.4.8 | |
Netgear R6300v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Netgear vulnerability is CVE-2023-38925.
CVE-2023-38925 has a severity level of high.
Netgear DC112A 1.0.0.64, EX6200 1.0.3.94, and R6300v2 1.0.4.8 are affected by CVE-2023-38925.
The vulnerability is caused by a buffer overflow in the http_passwd parameter in password.cgi.
Netgear has released firmware updates to address the CVE-2023-38925 vulnerability. It is recommended to update to the latest firmware version provided by Netgear for the affected devices.