CVE-2019-20753
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
16/04/2020
Last modified:
23/04/2020
Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects DGN2200v1 before 1.0.0.58, D8500 before 1.0.3.42, D7000v2 before 1.0.0.51, D6400 before 1.0.0.78, D6220 before 1.0.0.44, JNDR3000 before 1.0.0.24, R8000 before 1.0.4.18, R8500 before 1.0.2.122, R8300 before 1.0.2.122, R7900 before 1.0.2.16, R7000P before 1.3.2.34, R7300DST before 1.0.0.68, R7100LG before 1.0.0.46, R6900P before 1.3.2.34, R7000 before 1.0.9.28, R6900 before 1.0.1.46, R6700 before 1.0.1.46, R6400v2 before 1.0.2.56, R6400 before 1.0.1.42, R6300v2 before 1.0.4.28, R6250 before 1.0.4.26, WNDR3400v3 before 1.0.1.22, WNDR4500v2 before 1.0.0.72, and WNR3500Lv2 before 1.2.0.50.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:* | 1.0.0.58 (excluding) | |
| cpe:2.3:h:netgear:dgn2200:v1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:* | 1.0.3.42 (excluding) | |
| cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:* | 1.0.0.51 (excluding) | |
| cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:* | 1.0.0.78 (excluding) | |
| cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:* | 1.0.0.44 (excluding) | |
| cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:jndr3000_firmware:*:*:*:*:*:*:*:* | 1.0.0.24 (excluding) | |
| cpe:2.3:h:netgear:jndr3000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* | 1.0.4.18 (excluding) | |
| cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:* | 1.0.2.122 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



