First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the l2tp_user_ip parameter at l2tp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
Netgear XR300 | ||
Netgear R7000P | ||
NETGEAR R6400 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51002 is classified as a high severity vulnerability due to its potential for causing Denial of Service (DoS).
To fix CVE-2024-51002, users should update their affected Netgear devices to the latest firmware version that addresses this vulnerability.
CVE-2024-51002 affects Netgear R8500, XR300, R7000P, and R6400 products.
CVE-2024-51002 allows attackers to launch a Denial of Service (DoS) attack through a crafted POST request.
As of now, specific exploit details for CVE-2024-51002 are not publicly available, but the vulnerability facilitates a potential DoS attack.