Vulnerability Name:

CCN-198087

Published:2021-01-21
Updated:2021-01-21
Summary:NETGEAR products could are vulnerable to a pre-authentication stack-based buffer overflow, caused by improper bounds checking. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS v3 Severity:8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:8.3 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: NETGEAR Web site
NETGEAR: Networking Products Made For You

Source: XF
Type: UNKNOWN
netgear-routers1-bo(198087)

Source: CCN
Type: NETGEAR Security Advisory: PSV-2020-0432
Security Advisory for Stack-based Buffer Overflow Remote Code Execution Vulnerability on Some Routers

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/h:netgear:r7000:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8500:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8300:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r6300:v2:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:wndr3400:v3:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8000:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r6400:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r6400:v2:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:xr300:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rbr750:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rbs750:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rbr850:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rbs850:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex7000:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7100lg:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r6700:v3:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex6250:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7850:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7900:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7960p:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax200:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax75:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rs400:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex7500:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear r7000 -
    netgear r8500 -
    netgear r8300 -
    netgear r6300 v2
    netgear wndr3400 v3
    netgear r8000 -
    netgear r6400 -
    netgear r6400 v2
    netgear xr300 -
    netgear rbr750 -
    netgear rbs750 -
    netgear rbr850 -
    netgear rbs850 -
    netgear ex7000 -
    netgear r7100lg -
    netgear r6700 v3
    netgear ex6250 -
    netgear r7850 -
    netgear r7900 -
    netgear r7960p -
    netgear rax200 -
    netgear rax75 -
    netgear rs400 -
    netgear ex7500 -