Fortinet Discovers Stack Buffer Overflow in DGN2200 SOAP Handler
Summary
Fortinet's FortiGuard Labs has discovered multiple pre-authentication stack-based buffer overflows in Netgear DGN2200.
Netgear is a global computer networking company based in San Jose, California, in the United States. It produces networking hardware for consumers, businesses, and service providers.
There are multiple stack buffer overflow issues in Netgear's SOAP handlers. These handlers do not validate the user input before manipulating the arbitrary data that could be set directly via HTTP request which can result in remote code execution upon successful exploitation.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:Netgear.DGN2200.SOAP.Buffer.Overflow
Released Mar 15, 2018
Users should apply latest update from the vendor
Timeline
Fortinet reported the vulnerability to Netgear on 22, February 2018
Netgear confirmed the vulnerability on 14, March 2018
Netgear released patch for the vulnerability on 12, March 2019