First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160 was discovered to contain a stack overflow via the ipv6_pri_dns parameter at ipv6_fix.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
All of | ||
NETGEAR R8500 | =1.0.2.160 | |
NETGEAR R8500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51012 is classified as a Denial of Service vulnerability due to its ability to cause system crashes.
To fix CVE-2024-51012, update your Netgear R8500 device to the latest firmware version provided by Netgear.
CVE-2024-51012 can lead to a Denial of Service, causing the Netgear R8500 router to become unresponsive.
Yes, CVE-2024-51012 can be exploited remotely through a crafted POST request.
CVE-2024-51012 specifically affects Netgear R8500 routers running firmware version 1.0.2.160.