First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component ap_mode.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
Netgear XR300 | ||
Netgear R7000P | ||
NETGEAR R6400 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51003 is classified as a high-severity vulnerability due to its potential to cause a Denial of Service (DoS).
To fix CVE-2024-51003, update your affected Netgear device firmware to the latest version provided by Netgear that addresses these vulnerabilities.
CVE-2024-51003 affects Netgear R8500, XR300, R7000P, and R6400 devices running specific firmware versions identified in the vulnerability details.
CVE-2024-51003 contains multiple stack overflow vulnerabilities in the ap_mode.cgi component through the apmode_dns1_pri and apmode_dns1_sec parameters.
The impact of CVE-2024-51003 primarily includes the potential for attackers to exploit the vulnerability to trigger a Denial of Service (DoS) condition.