First published: Tue Nov 05 2024(Updated: )
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component wlg_adv.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R8500 | ||
Netgear XR300 | ||
Netgear R7000P | ||
NETGEAR R6400 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52016 is considered a high-severity vulnerability due to its potential to cause a Denial of Service (DoS).
To mitigate CVE-2024-52016, update the firmware of your affected Netgear devices to the latest version provided by Netgear.
CVE-2024-52016 impacts Netgear R8500, XR300, R7000P, and R6400 models.
If exploited, CVE-2024-52016 can lead to a Denial of Service (DoS), rendering the affected network devices unresponsive.
Check the firmware version of your Netgear device against the versions mentioned in CVE-2024-52016 to determine if it is vulnerable.