Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50994: n/a

0
Medium
VulnerabilityCVE-2024-50994cvecve-2024-50994
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50994 is a medium severity vulnerability affecting Netgear R8500 routers running firmware version 1. 0. 2. 160. It involves multiple stack overflow flaws in the ipv6_fix. cgi component, specifically via the ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, and ipv6_lan_length parameters. An attacker with low privileges and network access can send crafted POST requests to trigger these overflows, resulting in Denial of Service (DoS) conditions. The vulnerability does not impact confidentiality or integrity but can disrupt availability by crashing the device. No known exploits are currently reported in the wild, and no patches have been linked yet. Organizations using this router model should monitor for updates and restrict access to the management interface to mitigate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:13:03 UTC

Technical Analysis

CVE-2024-50994 identifies multiple stack-based buffer overflow vulnerabilities in the Netgear R8500 router firmware version 1.0.2.160, specifically within the ipv6_fix.cgi CGI script. The vulnerable parameters—ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, and ipv6_lan_length—are used to configure IPv6 WAN and LAN IP addresses and their lengths. Improper input validation allows an attacker with low privileges (PR:L) and network access (AV:A) to send specially crafted POST requests that overflow stack buffers, causing the device to crash or reboot, resulting in Denial of Service (DoS). The CVSS 3.1 base score is 5.7, reflecting a medium severity due to the lack of impact on confidentiality or integrity and the requirement for some privileges and network access. The vulnerability is classified under CWE-120 (Classic Buffer Overflow). No patches or known exploits are currently available, but the flaw poses a risk to network availability, especially in environments relying on IPv6 configurations. The attack does not require user interaction and affects the router’s management interface, which may be exposed internally or remotely depending on configuration.

Potential Impact

The primary impact of CVE-2024-50994 is the disruption of network availability through Denial of Service attacks. Organizations using the affected Netgear R8500 routers may experience network outages or degraded performance if an attacker exploits these stack overflow vulnerabilities. This can interrupt business operations, especially in environments where these routers serve as critical network gateways or handle IPv6 traffic. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can affect productivity, customer access, and potentially safety-critical systems relying on continuous network connectivity. The requirement for low privileges and network access limits the attack surface to internal or trusted networks unless remote management is enabled without adequate protections. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.

Mitigation Recommendations

To mitigate CVE-2024-50994, organizations should immediately restrict access to the Netgear R8500 router’s management interfaces, especially the IPv6 configuration CGI scripts, limiting them to trusted internal networks and authorized personnel only. Disable remote management features if not strictly necessary. Monitor network traffic for unusual POST requests targeting the ipv6_fix.cgi endpoint. Implement network segmentation to isolate critical routers from less trusted segments. Regularly check Netgear’s official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. As a temporary measure, consider disabling IPv6 on the router if it is not required, to reduce the attack surface. Additionally, maintain robust network monitoring and incident response capabilities to detect and respond to potential DoS attempts. Document and test recovery procedures to minimize downtime in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba4b7ef31ef0b557793

Added to database: 2/25/2026, 9:37:40 PM

Last enriched: 2/26/2026, 1:13:03 AM

Last updated: 2/26/2026, 7:41:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats