NETGEAR.NightHawk.ASP.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Post-Authentication Stack Buffer Overflow vulnerability in Netgear Routers.
The vulnerability is due to the ASP handler not assessing the length of the WPA/WPA2 password when it was set by attacker through Common Gateway Interface (CGI) script. A remote attacker may be able exploit this to execute arbitrary code within the context of the application.
Affected Products
D8500, running firmware versions prior to 1.0.3.43
R8500, running firmware versions prior to 1.0.2.128
R8300, running firmware versions prior to 1.0.2.128
R8000, running firmware versions prior to 1.0.4.28
R7300DST, running firmware versions prior to 1.0.0.68
R7100LG, running firmware versions prior to 1.0.0.48
R6900P, running firmware versions prior to 1.3.1.44
R7900P, running firmware versions prior to 1.4.1.30
R8000P, running firmware versions prior to 1.4.1.30
R7000P, running firmware versions prior to 1.3.1.44
R7000, running firmware versions prior to 1.0.9.34
R6900, running firmware versions prior to 1.0.2.4
R6700, running firmware versions prior to 1.0.2.6
R6400, running firmware versions prior to 1.0.1.44
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's advisory for updates:
https://kb.netgear.com/000060637/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Modem-Routers-and-Gateways-PSV-2018-0197
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |