Fortinet Discovers Netgear WLAN Configuration Stack Buffer Overflow in SOAP handler
Fortinet's FortiGuard Labs has discovered post-authentication buffer overflow vulnerability in Netgear Routers.
Netgear is a global computer networking company based in San Jose, California, in the United States. It produces networking hardware for consumers, businesses, and service providers
Nighthawk X6/X8 suffers stack-based buffer overflow vulnerability that can be triggered when arbitrary wireless SSID is sent to CGI handler and later the said SSID is retrieved via WLANConfiguration SOAP request
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jul 02, 2018
Apply the latest update from the vendor
Fortinet reported the vulnerability to Netgear on 29, May 2018
Netgear confirmed the vulnerability on 30, May 2018
Netgear released patch for the vulnerability on 05, June 2019
This vulnerability was discovered by Wayne Low of Fortinet's FortiGuard Labs.