First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component openvpn.cgi via the openvpn_service_port and openvpn_service_port_tun parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
All of | ||
NETGEAR R8500 | =1.0.2.160 | |
NETGEAR R8500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50998 has been identified as a critical vulnerability due to its potential to cause Denial of Service (DoS).
To mitigate CVE-2024-50998, you should update the Netgear R8500 firmware to the latest secure version provided by Netgear.
CVE-2024-50998 affects the openvpn.cgi component of the Netgear R8500 router.
CVE-2024-50998 can facilitate Denial of Service (DoS) attacks through specially crafted POST requests.
Netgear R8500 version 1.0.2.160 is known to be vulnerable to CVE-2024-50998.