Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400 before 1.0.1.68, R7000 before 1.0.11.116, R6900P before 1.3.3.140, R7000P before 1.3.3.140, R7900 before 1.0.4.38, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, and XR300 before 1.0.3.50.
References
Link | Resource |
---|---|
https://kb.netgear.com/000064072/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2019-0214 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2021-12-26 01:15
Updated : 2022-01-05 20:46
NVD link : CVE-2021-45605
Mitre link : CVE-2021-45605
CVE.ORG link : CVE-2021-45605
JSON object : View
Products Affected
netgear
- xr300_firmware
- rax80
- r7000p
- rax75
- r7000_firmware
- rax80_firmware
- r6400
- r7900
- r6900p
- rax75_firmware
- r7900_firmware
- r6400_firmware
- r7000p_firmware
- r6900p_firmware
- r7000
- xr300
CWE
CWE-787
Out-of-bounds Write