NETGEAR.NightHawk.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Cxecution attack on Netgear Nighthawk routers.
The vulnerability is due to the CGI handler not assessing the length of the device name sent via HTTP request. A remote attacker may be able exploit this to execute arbitrary code within the context of the application.

affected-products-logoAffected Products

D6220, running firmware versions prior to 1.0.0.48
D6400, running firmware versions prior to 1.0.0.82
D7000v2, running firmware versions prior to 1.0.0.52
D8500, running firmware versions prior to 1.0.3.43
R6250, running firmware versions prior to 1.0.4.34
R6400, running firmware versions prior to 1.0.1.44
R6400v2, running firmware versions prior to 1.0.2.62
R7100LG, running firmware versions prior to 1.0.0.48
R7300DST, running firmware versions prior to 1.0.0.68
R7900, running firmware versions prior to 1.0.3.8
R7900P, running firmware versions prior to 1.4.1.30
R8000, running firmware versions prior to 1.0.4.28
R8000P, running firmware versions prior to 1.4.1.30
R8300, running firmware versions prior to 1.0.2.128
R8500, running firmware versions prior to 1.0.2.128

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-10 25.619 Name:Netgear.
NightHawk.
Buffer.
Overflow:NETGEAR.
NightHawk.
Buffer.
Overflow
2019-10-08 14.701 Name:FG-VD-18-047_Netgear.
0day:Netgear.
NightHawk.
Buffer.
Overflow