Vulnerability Description
NETGEAR R6400 devices before 1.0.1.70 are affected by a stack-based buffer overflow by an authenticated user.
CVSS Score
6.9
MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | R6400 Firmware | < 1.0.1.70 |
| Netgear | R6400 | - |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000063771/Security-Advisory-for-Post-Authentication-StackVendor Advisory
- https://kb.netgear.com/000063771/Security-Advisory-for-Post-Authentication-StackVendor Advisory
FAQ
What is CVE-2021-38523?
CVE-2021-38523 is a vulnerability with a CVSS score of 6.9 (MEDIUM). NETGEAR R6400 devices before 1.0.1.70 are affected by a stack-based buffer overflow by an authenticated user.
How severe is CVE-2021-38523?
CVE-2021-38523 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-38523?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear R6400 Firmware, Netgear R6400.