Fortinet Discovers Netgear WAN DNS Stack Buffer Overflow in SOAP Handler
Summary
Fortinet's FortiGuard Labs has discovered post authentication buffer overflow vulnerability in Netgear routers.
Netgear is a global computer networking company based in San Jose, California, in the United States. It produces networking hardware for consumers, businesses, and service providers
The routers suffer stack-based buffer overflow vulnerability that can be triggered when arbitrary WAN DNS is sent to CGI handler and later the said DNS setting is retrieved via SOAP request
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:Netgear.WAN.SOAP.Buffer.Overflow
Released Jul 02, 2018
Users should apply latest update from the vendor
Timeline
Fortinet reported the vulnerability to Netgear on 31, May 2018
Netgear confirmed the vulnerability on 14, July 2018
Netgear released patch for the vulnerability on 04, September 2019