Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component wlg_adv.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
References
| Link | Resource |
|---|---|
| https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_49/49.md | Broken Link |
| https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2024-11-05 15:15
Updated : 2025-05-21 20:23
NVD link : CVE-2024-52016
Mitre link : CVE-2024-52016
CVE.ORG link : CVE-2024-52016
JSON object : View
Products Affected
netgear
- xr300_firmware
- r8500_firmware
- xr300
- r7000p
- r6400v2_firmware
- r7000p_firmware
- r6400v2
- r8500
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
