NETGEAR Router KCodes NetUSB Driver Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1032377|
SecurityTracker URL: http://securitytracker.com/id/1032377
(Links to External Site)
Date: May 21 2015
Execution of arbitrary code via network, User access via network|
A vulnerability was reported in multiple NETGEAR Routers. A remote user can execute arbitrary code on the target system.|
A remote user can send a specially crafted computername value via TCP port 20005 to trigger a stack overflow in the run_init_sbus() function in the KCodes NetUSB driver (i.e., NETGEAR ReadySHARE feature) and execute arbitrary code on the target system or cause the target system to reboot.
Other port numbers may also be affected.
The following model is affected:
The following models may be affected:
NETGEAR CENTRIA (WNDR4700/4720)
NETGEAR DC112A (Zain)
The original advisory is available at:
Stefan Viehbock of SEC Consult Vulnerability Lab reported this vulnerability.
A remote user can execute arbitrary code on the target system.|
No solution was available at the time of this entry.|
Vendor URL: www.netgear.com/ (Links to External Site)
Source Message Contents
[Original Message Not Available for Viewing]