A vulnerability was found in Netgear R6900 1.0.1.26_1.0.20. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file upgrade_check.cgi of the component HTTP Header Handler. The manipulation of the argument Content-Length leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Wed, 04 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear r6900 Firmware
CPEs cpe:2.3:o:netgear:r6900_firmware:1.0.1.26:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear r6900 Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Netgear R6900 1.0.1.26_1.0.20. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file upgrade_check.cgi of the component HTTP Header Handler. The manipulation of the argument Content-Length leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Netgear R6900 HTTP Header upgrade_check.cgi buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 6.8, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:C'}

cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-12-04T17:31:04.826Z

Updated: 2024-12-04T21:05:51.105Z

Reserved: 2024-12-04T12:46:25.939Z

Link: CVE-2024-12147

cve-icon Vulnrichment

Updated: 2024-12-04T21:05:27.278Z

cve-icon NVD

Status : Received

Published: 2024-12-04T18:15:11.803

Modified: 2024-12-04T18:15:11.803

Link: CVE-2024-12147

cve-icon Redhat

No data.