First published: Tue Nov 05 2024(Updated: )
Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the ssid parameter in bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear NMS300 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51022 has been categorized as a high severity vulnerability due to its potential to cause Denial of Service (DoS).
To fix CVE-2024-51022, update the Netgear XR300 firmware to the latest version released by Netgear that addresses this vulnerability.
The potential impacts of CVE-2024-51022 include service disruption and denial of network access due to the stack overflow vulnerability.
CVE-2024-51022 specifically affects the Netgear XR300 running version 1.0.3.78.
CVE-2024-51022 can be exploited via a crafted POST request leading to a stack overflow and resulting in a Denial of Service.