NETGEAR.WAN.SOAP.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Post-Authentication Stack Buffer Overflow vulnerability in Netgear Routers.
The vulnerability is caused by stack buffer overflow issue in SOAP handler. An attacker can trick an unsuspecting user into visiting a malicious webpage and execute arbitrary code within the context of the application.
Affected Products
D6220, running firmware versions prior to 1.0.0.52
D6400, running firmware versions prior to 1.0.0.86
D7000v2, running firmware versions prior to 1.0.0.53
D8500, running firmware versions prior to 1.0.3.44
DGN2200v4, running firmware versions prior to 1.0.0.110
DGND2200Bv4, running firmware versions prior to 1.0.0.109
R6250, running firmware versions prior to 1.0.4.34
R6300v2, running firmware versions prior to 1.0.4.32
R6400, running firmware versions prior to 1.0.1.46
R6400v2, running firmware versions prior to 1.0.2.62
R6700, running firmware versions prior to 1.0.2.6
R6900, running firmware versions prior to 1.0.2.4
R6900P, running firmware versions prior to 1.3.1.64
R7000, running firmware versions prior to 1.0.9.60
R7000P, running firmware versions prior to 1.3.1.64
R7100LG, running firmware versions prior to 1.0.0.52
R7300DST, running firmware versions prior to 1.0.0.70
R7900, running firmware versions prior to 1.0.3.8
R7900P, running firmware versions prior to 1.4.1.30
R8000, running firmware versions prior to 1.0.4.28
R8000P, running firmware versions prior to 1.4.1.30
R8300, running firmware versions prior to 1.0.2.128
R8500, running firmware versions prior to 1.0.2.128
WNDR3400v3, running firmware versions prior to 1.0.1.24
WNR3500Lv2, running firmware versions prior to 1.2.0.56
Impact
System Compromise: Remote attackers can gain control of vulnerable systems
Recommended Actions
Refer to the vendor's advisory for updates:
https://kb.netgear.com/000061216/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0323
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |