Vulnerability Description
Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the check_auth function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Jwnr2000V2 Firmware | 1.0.0.11 |
| Netgear | Jwnr2000V2 | - |
| Netgear | Xwn5001 Firmware | 0.4.1.1 |
| Netgear | Xwn5001 | - |
| Netgear | Xavn2001V2 Firmware | 0.4.0.7 |
| Netgear | Xavn2001V2 | - |
Related Weaknesses (CWE)
References
- https://github.com/FirmRec/IoT-Vulns/blob/main/netgear/http_passwd_auth/README.mExploitThird Party Advisory
- https://www.netgear.com/about/security/Vendor Advisory
- https://github.com/FirmRec/IoT-Vulns/blob/main/netgear/http_passwd_auth/README.mExploitThird Party Advisory
- https://www.netgear.com/about/security/Vendor Advisory
FAQ
What is CVE-2023-39550?
CVE-2023-39550 is a vulnerability with a CVSS score of 8.8 (HIGH). Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the check_auth function...
How severe is CVE-2023-39550?
CVE-2023-39550 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39550?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Jwnr2000V2 Firmware, Netgear Jwnr2000V2, Netgear Xwn5001 Firmware, Netgear Xwn5001, Netgear Xavn2001V2 Firmware.