Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component ipv6_fix.cgi via the ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, and ipv6_lan_length parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
References
| Link | Resource |
|---|---|
| https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_36/36.md | Broken Link |
| https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-11-05 15:15
Updated : 2025-04-22 18:11
NVD link : CVE-2024-50994
Mitre link : CVE-2024-50994
CVE.ORG link : CVE-2024-50994
JSON object : View
Products Affected
netgear
- r8500_firmware
- r8500
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
