First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at bsw_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
Netgear NMS300 Firmware | ||
Netgear Routers | ||
Netgear R6400 v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52015 is classified as a critical vulnerability that can lead to Denial of Service attacks.
To fix CVE-2024-52015, update the affected Netgear routers to the latest firmware version provided by Netgear.
CVE-2024-52015 affects the Netgear R8500, XR300, R7000P, and R6400 v2 routers.
CVE-2024-52015 can be exploited by attackers sending a crafted POST request that triggers a stack overflow.
If unable to update, it is advised to limit external access to the affected devices and monitor for any unusual activity.