First published: Tue Nov 05 2024(Updated: )
Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the passphrase parameter at bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear NMS300 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52017 is classified as a denial of service vulnerability that can disrupt the availability of the Netgear XR300 device.
To fix CVE-2024-52017, it's recommended to update the Netgear XR300 to the latest firmware version provided by Netgear.
CVE-2024-52017 is caused by a stack overflow due to improper handling of the passphrase parameter in bridge_wireless_main.cgi.
Yes, CVE-2024-52017 can be exploited remotely through a crafted POST request to the affected device.
CVE-2024-52017 specifically affects the Netgear XR300 device running firmware version 1.0.3.78.