← Voltar para CVEs
CVE-2020-26913
MEDIUM6.8
Descricao
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.63, R7800 before 1.0.2.60, R8900 before 1.0.4.26, R9000 before 1.0.4.26, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, SRK60 before 2.2.2.20, SRR60 before 2.2.2.20, SRS60 before 2.2.2.20, WN3000RPv2 before 1.0.0.78, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.70, XR450 before 2.3.2.40, and XR500 before 2.3.2.40.
Detalhes CVE
Pontuacao CVSS v3.16.8
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueADJACENT_NETWORK
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado10/9/2020
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
netgear:d6100netgear:d6100_firmwarenetgear:r7800netgear:r7800_firmwarenetgear:r8900netgear:r8900_firmwarenetgear:r9000netgear:r9000_firmwarenetgear:rbk20netgear:rbk20_firmwarenetgear:rbk40netgear:rbk40_firmwarenetgear:rbk50netgear:rbk50_firmwarenetgear:rbr20netgear:rbr20_firmwarenetgear:rbr50netgear:rbr50_firmwarenetgear:rbs20netgear:rbs20_firmwarenetgear:rbs40netgear:rbs40_firmwarenetgear:rbs50netgear:rbs50_firmwarenetgear:srk60netgear:srk60_firmwarenetgear:srr60netgear:srr60_firmwarenetgear:srs60netgear:srs60_firmwarenetgear:wn3000rpv2netgear:wn3000rpv2_firmwarenetgear:wndr4300v2netgear:wndr4300v2_firmwarenetgear:wndr4500v3netgear:wndr4500v3_firmwarenetgear:wnr2000v5netgear:wnr2000v5_firmwarenetgear:xr450netgear:xr450_firmwarenetgear:xr500netgear:xr500_firmware
Fraquezas (CWE)
CWE-787
Referencias
https://kb.netgear.com/000062340/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2018-0140(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.