First published: Tue Nov 05 2024(Updated: )
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at wizpppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear NMS300 Firmware | ||
Netgear Routers | ||
Netgear R6400 v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52024 has been classified as a high severity vulnerability due to its potential to cause a Denial of Service (DoS).
To mitigate CVE-2024-52024, update the firmware of affected Netgear devices to the latest version provided by Netgear.
CVE-2024-52024 affects Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128.
CVE-2024-52024 enables attackers to perform a Denial of Service (DoS) by exploiting a stack overflow vulnerability.
The vulnerability in CVE-2024-52024 is related to the 'pppoe_localip' parameter in the 'wizpppoe.cgi' script.