Vulnerability Description
NETGEAR R7800 devices before 1.0.2.52 are affected by a stack-based buffer overflow by an authenticated user.
CVSS Score
6.8
MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | R7800 Firmware | < 1.0.2.52 |
| Netgear | R7800 | - |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000060634/Security-Advisory-for-Post-Authentication-StackVendor Advisory
- https://kb.netgear.com/000060634/Security-Advisory-for-Post-Authentication-StackVendor Advisory
FAQ
What is CVE-2019-20765?
CVE-2019-20765 is a vulnerability with a CVSS score of 6.8 (MEDIUM). NETGEAR R7800 devices before 1.0.2.52 are affected by a stack-based buffer overflow by an authenticated user.
How severe is CVE-2019-20765?
CVE-2019-20765 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-20765?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear R7800 Firmware, Netgear R7800.