NETGEAR.NightHawk.ASP.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Post-Authentication Stack Buffer Overflow vulnerability in Netgear Routers.
The vulnerability is due to the ASP handler not assessing the length of the WPA/WPA2 password when it was set by attacker through Common Gateway Interface (CGI) script. A remote attacker may be able exploit this to execute arbitrary code within the context of the application.

affected-products-logoAffected Products

D8500, running firmware versions prior to 1.0.3.43
R8500, running firmware versions prior to 1.0.2.128
R8300, running firmware versions prior to 1.0.2.128
R8000, running firmware versions prior to 1.0.4.28
R7300DST, running firmware versions prior to 1.0.0.68
R7100LG, running firmware versions prior to 1.0.0.48
R6900P, running firmware versions prior to 1.3.1.44
R7900P, running firmware versions prior to 1.4.1.30
R8000P, running firmware versions prior to 1.4.1.30
R7000P, running firmware versions prior to 1.3.1.44
R7000, running firmware versions prior to 1.0.9.34
R6900, running firmware versions prior to 1.0.2.4
R6700, running firmware versions prior to 1.0.2.6
R6400, running firmware versions prior to 1.0.1.44

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-10 25.619 Name:Netgear.
NightHawk.
ASP.
Buffer.
Overflow:NETGEAR.
NightHawk.
ASP.
Buffer.
Overflow
2019-08-07 14.665 Name:FG-VD-18-051_Netgear.
0day:Netgear.
NightHawk.
ASP.
Buffer.
Overflow