First published: Tue Nov 05 2024(Updated: )
Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the addName%d parameter in usb_approve.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear NMS300 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51016 has been assessed as a high severity vulnerability due to its potential to cause a Denial of Service (DoS).
To mitigate CVE-2024-51016, users should update the Netgear XR300 firmware to the latest version provided by the vendor.
CVE-2024-51016 is classified as a stack overflow vulnerability that can be exploited through crafted POST requests.
CVE-2024-51016 can lead to a Denial of Service (DoS), rendering the Netgear XR300 router inaccessible.
As of now, there is no public information indicating that CVE-2024-51016 is being actively exploited in the wild.