NETGEAR.USB.CGI.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Post-Authentication Stack Buffer Overflow vulnerability in Netgear Routers.
The vulnerability is caused by stack buffer overflow issue in CGI handler. An attacker can trick an unsuspecting user into visiting a malicious webpage and execute arbitrary code within the context of the application.
Affected Products
D8500, running firmware versions prior to 1.0.3.44
R6250, running firmware versions prior to 1.0.4.34
R6300v2, running firmware versions prior to 1.0.4.32
R6400, running firmware versions prior to 1.0.1.46
R6700, running firmware versions prior to 1.0.2.6
R6900, running firmware versions prior to 1.0.2.4
R6900P, running firmware versions prior to 1.3.1.64
R7000, running firmware versions prior to 1.0.9.42
R7000P, running firmware versions prior to 1.3.1.64
R7100LG, running firmware versions prior to 1.0.0.50
R7300DST, running firmware versions prior to 1.0.0.70
R7900, running firmware versions prior to 1.0.3.8
R7900P, running firmware versions prior to 1.4.1.30
R8000, running firmware versions prior to 1.0.4.28
R8000P, running firmware versions prior to 1.4.1.30
R8300, running firmware versions prior to 1.0.2.128
R8500, running firmware versions prior to 1.0.2.128
Impact
System Compromise: Remote attackers can gain control of vulnerable systems
Recommended Actions
Refer to the vendor's advisory for updates:
https://kb.netgear.com/000061215/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0253
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |