Netgear.NightHawk.CGI.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Post-Authentication Buffer Overflow vulnerability in Netgear Routers.
The vulnerability is due to an improper boundary check condition in the application. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.
Affected Products
System Compromise: Remote attackers can gain control of vulnerable systems.
Impact
System Compromise: Remote attackers can execute arbitrary script code in the context of the application
Recommended Actions
Refer to the vendor's advisory for updates:
https://kb.netgear.com/000060976/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0258
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-08-07 | 14.665 | Name:FG-VD-18-094_Netgear. 0day:Netgear. NightHawk. CGI. Buffer. Overflow |