Fortinet Discovers Netgear WLAN Configuration Stack Buffer Overflow in SOAP handler
Summary
Fortinet's FortiGuard Labs has discovered post-authentication buffer overflow vulnerability in Netgear Routers.
Netgear is a global computer networking company based in San Jose, California, in the United States. It produces networking hardware for consumers, businesses, and service providers
Nighthawk X6/X8 suffers stack-based buffer overflow vulnerability
that can be triggered when arbitrary wireless SSID is sent to CGI handler and
later the said SSID is retrieved via WLANConfiguration SOAP request
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:Netgear.NightHawk.CGI.Buffer.Overflow
Released Jul 02, 2018
Apply​ ​the​ ​latest​ ​update​ ​from​ ​the​ ​vendor Â
Timeline
Fortinet reported the vulnerability to Netgear on 29, May 2018
Netgear confirmed the vulnerability on 30, May 2018
Netgear released patch for the vulnerability on 05, June 2019