First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the bpa_server parameter at genie_bpa.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
Netgear NMS300 Firmware | ||
Netgear Routers | ||
Netgear R6400 v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50996 has been categorized as a high severity vulnerability due to its potential to cause a Denial of Service.
To mitigate CVE-2024-50996, users should upgrade their affected Netgear devices to the latest firmware version provided by the vendor.
CVE-2024-50996 affects Netgear R8500, XR300, R7000P, and R6400 v2 devices running specific firmware versions.
CVE-2024-50996 enables an attacker to execute a Denial of Service attack through a crafted POST request.
CVE-2024-50996 involves a stack overflow vulnerability via the bpa_server parameter in genie_bpa.cgi.