Vulnerability Name: CVE-2018-21148 (CCN-180543) Assigned: 2018-06-22 Published: 2018-06-22 Updated: 2020-04-24 Summary: Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.50, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64. CVSS v3 Severity: 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H )5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): LowPrivileges Required (PR): HighUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H )5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): LowPrivileges Required (PR): HighUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 5.2 Medium (CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): LowAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.7 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2018-21148 Source: XF Type: UNKNOWNnetgear-cve201821148-bo(180543) Source: CCN Type: NETGEAR Security Advisory: PSV-2017-3157Security Advisory for Post-Authentication Stack Overflow on Some Gateways and Routers Source: CONFIRM Type: Vendor Advisoryhttps://kb.netgear.com/000059485/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Gateways-and-Routers-PSV-2017-3157 Vulnerable Configuration: Configuration 1 :cpe:/o:netgear:d7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.34)AND cpe:/h:netgear:d7800:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:netgear:dm200_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.50)AND cpe:/h:netgear:dm200:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:netgear:r6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.22)AND cpe:/h:netgear:r6100:-:*:*:*:*:*:*:* Configuration 4 :cpe:/o:netgear:r7500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.122)AND cpe:/h:netgear:r7500:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:netgear:r7500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.26)AND cpe:/h:netgear:r7500:v2:*:*:*:*:*:*:* Configuration 6 :cpe:/o:netgear:r7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.42)AND cpe:/h:netgear:r7800:-:*:*:*:*:*:*:* Configuration 7 :cpe:/o:netgear:r8900_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.10)AND cpe:/h:netgear:r8900:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:netgear:r9000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.10)AND cpe:/h:netgear:r9000:-:*:*:*:*:*:*:* Configuration 9 :cpe:/o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.96)AND cpe:/h:netgear:wndr3700:v4:*:*:*:*:*:*:* Configuration 10 :cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.98)AND cpe:/h:netgear:wndr4300:-:*:*:*:*:*:*:* Configuration 11 :cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.54)AND cpe:/h:netgear:wndr4300:v2:*:*:*:*:*:*:* Configuration 12 :cpe:/o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.54)AND cpe:/h:netgear:wndr4500:v3:*:*:*:*:*:*:* Configuration 13 :cpe:/o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.64)AND cpe:/h:netgear:wnr2000:v5:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:netgear:r7800_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:r7500v2_firmware:1.0.3:*:*:*:*:*:*:* OR cpe:/o:netgear:d7800_firmware:1.0.1:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr3700v4_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4300_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4300v2_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wnr2000v5_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4500v3_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:dm200_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:r9000_firmware:1.0.3:*:*:*:*:*:*:* OR cpe:/o:netgear:r6100_firmware:1.0.1:*:*:*:*:*:*:* OR cpe:/o:netgear:r7500_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:r8900_firmware:1.0.3:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
netgear d7800 firmware *
netgear d7800 -
netgear dm200 firmware *
netgear dm200 -
netgear r6100 firmware *
netgear r6100 -
netgear r7500 firmware *
netgear r7500 -
netgear r7500 firmware *
netgear r7500 v2
netgear r7800 firmware *
netgear r7800 -
netgear r8900 firmware *
netgear r8900 -
netgear r9000 firmware *
netgear r9000 -
netgear wndr3700 firmware *
netgear wndr3700 v4
netgear wndr4300 firmware *
netgear wndr4300 -
netgear wndr4300 firmware *
netgear wndr4300 v2
netgear wndr4500 firmware *
netgear wndr4500 v3
netgear wnr2000 firmware *
netgear wnr2000 v5
netgear r7800 firmware 1.0.2
netgear r7500v2 firmware 1.0.3
netgear d7800 firmware 1.0.1
netgear wndr3700v4 firmware 1.0.2
netgear wndr4300 firmware 1.0.2
netgear wndr4300v2 firmware 1.0.0
netgear wnr2000v5 firmware 1.0.0
netgear wndr4500v3 firmware 1.0.0
netgear dm200 firmware 1.0.0
netgear r9000 firmware 1.0.3
netgear r6100 firmware 1.0.1
netgear r7500 firmware 1.0.0
netgear r8900 firmware 1.0.3