Vulnerability Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6100 before 1.0.1.20, R7800 before 1.0.2.40, and R9000 before 1.0.2.52.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | R6100 Firmware | < 1.0.1.20 |
| Netgear | R6100 | - |
| Netgear | R7800 Firmware | < 1.0.2.40 |
| Netgear | R7800 | - |
| Netgear | R9000 Firmware | < 1.0.2.52 |
| Netgear | R9000 | - |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000053204/Security-Advisory-for-Post-Authentication-StackVendor Advisory
- https://kb.netgear.com/000053204/Security-Advisory-for-Post-Authentication-StackVendor Advisory
FAQ
What is CVE-2017-18698?
CVE-2017-18698 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6100 before 1.0.1.20, R7800 before 1.0.2.40, and R9000 before 1.0.2.52.
How severe is CVE-2017-18698?
CVE-2017-18698 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-18698?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear R6100 Firmware, Netgear R6100, Netgear R7800 Firmware, Netgear R7800, Netgear R9000 Firmware.