Fortinet Discovers Netgear R8500 Stack Buffer Overflow in ASP Handler
Fortinet's FortiGuard Labs has discovered post-authentication stack buffer overflow vulnerability in Netgear Routers.
Netgear is a global computer networking company based in San Jose, California, in the United States. It produces networking hardware for consumers, businesses, and service providers
There is stack buffer overflow issue in ef_get_wireless_security Active Server Page (ASP) handler. The ASP handler does not assess the length of the WPA/WPA2 password when it was set by attacker through Common Gateway Interface (CGI) script.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released May 11, 2018
Users should apply the latest update from the vendor
Fortinet reported the vulnerability to Netgear on 27, April 2018
Netgear confirmed the vulnerability on 28, April 2018
Netgear released patch for the vulnerability on 11, March 2019
This vulnerability was discovered by Wayne Low of Fortinet's FortiGuard Labs.